Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol
暂无分享,去创建一个
[1] Xinyu Xing,et al. Security Analysis and Authentication Improvement for IEEE 802.11i Specification , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[3] Manoj Kumar,et al. CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering , 2015, WCI '15.
[4] Jyh-Cheng Chen,et al. Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Commun. Mag..
[5] Dijiang Huang,et al. IEEE 802.11 Wireless LAN Control Frame Protection , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[6] Pardeep Kumar,et al. Clouds: Concept to optimize the Quality of Service (QOS) for clusters , 2011, 2011 World Congress on Information and Communication Technologies.
[7] Manoj Diwakar,et al. CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain , 2020, Biomed. Signal Process. Control..
[8] Niranjan Lal,et al. Text Security using 2D Cellular Automata Rules , 2013 .
[9] Yu Cheng,et al. Security Analysis of Camera File Transfer Over Wi-Fi , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[10] Floriano De Rango,et al. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..
[11] M.A. Khan,et al. Pseudo Random Number Based authentication to counter denial of service attacks on 802.11 , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).
[12] Rizal Munadi,et al. Simple Prevention of Advanced Stealth Man-in-The-Middle Attack in WPA2 Wi-Fi Networks , 2019, 2019 International Conference on Electrical Engineering and Computer Science (ICECOS).
[13] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[14] Chris Imafidon,et al. Addressing the vulnerability of the 4-way handshake of 802.11i , 2008, 2008 Third International Conference on Digital Information Management.
[15] Hyunseung Choo,et al. A Robust Session Key Distribution in 802.11i , 2008, 2008 International Conference on Computational Sciences and Its Applications.
[16] Matthew S Gast. 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .
[17] Yao Yao,et al. Enhancing RC4 algorithm for WLAN WEP protocol , 2010, 2010 Chinese Control and Decision Conference.
[18] Deng Shiyang. Compare of new security strategy with several others in WLAN , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[19] David R. Cheriton,et al. DoS and authentication in wireless public access networks , 2002, WiSE '02.
[20] Jyh-Cheng Chen,et al. Wireless LAN security and IEEE 802.11i , 2005, IEEE Wirel. Commun..
[21] John C. Mitchell,et al. Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.
[22] Y. Challal,et al. Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..
[23] Paul Arana,et al. Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) , 2006 .
[24] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) , 2009, 2009 International Conference on Future Computer and Communication.
[25] Thomas J. Owens,et al. Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions , 2010, 2010 17th International Conference on Telecommunications.
[26] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.
[27] G. Noel,et al. An integrated security model for WLAN , 2009, AFRICON 2009.