The proactive intrusion prevention for Wireless Local Area Network
暂无分享,去创建一个
[1] Alessandro Neri,et al. Integrated security architecture for WLAN , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[2] Woei-Jiunn Tsaur,et al. A mobile agent protected scheme using pairing-based cryptosystems , 2005, Int. J. Mob. Commun..
[3] H. Joseph Wen,et al. An efficient wireless transmission method for m-commerce , 2004, Int. J. Mob. Commun..
[4] Qilian Liang,et al. Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[5] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[6] Chang Liu,et al. Wireless trust: conceptual and operational definition , 2004, Int. J. Mob. Commun..
[7] S. Upadhyaya,et al. SWAN: a secure wireless LAN architecture , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[8] Ali Bakirdan,et al. Security algorithms in wireless LAN: proprietary or nonproprietary , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[9] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[10] Golden G. Richard,et al. Physically Locating Wireless Intruders , 2004, ITCC.
[11] Greg Goth. NEWS: Will the White House Take on Wi-Fi? , 2003, IEEE Distributed Syst. Online.
[12] Wang Yue,et al. WLAN and it's security problems , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[13] John Ioannidis,et al. A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.
[14] Henry L. Owen,et al. Wireless intrusion detection and response: a classic study using main-in-the-middle attack , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[15] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[16] Jizhou Sun,et al. Intrusion detection solution to WLANs , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[17] Ari J. Maunuksela,et al. Micromobility supported WLAN networks: an empirical study of new IP protocol to support mobility and connection handovers , 2005, Int. J. Mob. Commun..
[18] Rob Flickenger. Building Wireless Community Community Networks , 2003 .
[19] Jizhou Sun,et al. Intrusion detection for wireless local area network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[20] D. Sampath,et al. Strengthening WEP protocol for wireless networks using block chaining algorithm with variable encrypting function mechanism , 2004, 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communications.
[21] Yong-Hua Song,et al. OFDM over IEEE 802.11b hardware for telemedical applications , 2004, Int. J. Mob. Commun..
[22] Chang Liu,et al. Conceptual and operational definition of system complexity in the domain of Wireless Internet via Mobile Technology , 2003, Int. J. Mob. Commun..
[23] Henry L. Owen,et al. Wireless intrusion detection and response , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[24] A. Celik,et al. Improving the security of wireless LANs by managing 802.1x disassociation , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..
[25] Bruce Potter,et al. Wireless Security's Future , 2003, IEEE Secur. Priv..
[26] Upkar Varshney,et al. Wireless in the enterprise: requirements, solutions and research directions , 2004, Int. J. Mob. Commun..