Security-Performance Tradeoffs in a Class of Wireless Network Scenarios
暂无分享,去创建一个
[1] Wassim El-Hajj,et al. The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures , 2012, Secur. Commun. Networks.
[2] Abderrahmane Lakas,et al. Analysis of the effect of security on data and voice traffic in WLAN , 2007, Comput. Commun..
[3] Wenye Wang,et al. Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..
[4] Brahmjit Singh,et al. Experimental Study to Analyze the Security Performance in Wireless LANs , 2015, Wirel. Pers. Commun..
[5] Ajaz Hussain Mir,et al. Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[6] Brahmjit Singh,et al. Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption , 2013 .
[7] Steven Myers,et al. IPSec: Performance Analysis and Enhancements , 2007, 2007 IEEE International Conference on Communications.
[8] Li Rui. Security Analysis and Improvement of RADIUS Server , 2007 .
[9] Peng Li,et al. WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[10] Deepak C. Karia,et al. Performance measurement of WEP and WPA2 on WLAN using OpenVPN , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).
[11] Vincenzo Mancuso,et al. QoS Requirements For Multimedia Services , 2007 .
[12] Dirk Van der Walt. FreeRADIUS beginner's guide : manage your network resources with FreeRADIUS , 2011 .
[13] Mohammed Boulmalf,et al. Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[14] Mohammed Boulmalf,et al. On the Impact of Security on the Performance of WLANs , 2007, J. Commun..
[15] Brian Ward. The Book of VMware , 2002 .
[16] Praveen Likhar,et al. Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis , 2011, ArXiv.
[17] Alistair Munro,et al. Performance comparison of cooperative and non-cooperative relaying mechanisms in wireless networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[18] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[19] Gene Tsudik,et al. Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.
[20] Nilufar Baghaei,et al. IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[21] Wenye Wang,et al. On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility , 2007, Mob. Networks Appl..
[22] Alan Holt,et al. 802.11 Wireless Networks - Security and Analysis , 2010, Computer Communications and Networks.
[23] Shuangqing Wei,et al. Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts , 2013, IEEE Trans. Inf. Forensics Secur..
[24] Pushpendra Kumar Peteriya. A Pragmatic Study on Different Stream Ciphers And On Different Flavors of RC4 Stream Cipher , 2012 .
[25] Samer Khasawneh,et al. Analyzing the Impact of Security Protocols on Wireless LAN with Multimedia Applications , 2012, SECURWARE 2012.
[26] Earnest Brandenburg. SPEECH INVADES THE MILITARY , 1952 .
[27] Shaneel Narayan,et al. Network performance evaluation of wireless IEEE802.11n encryption methods on Windows Vista and Windows Server 2008 operating systems , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.
[28] Poonam Jindal,et al. Performance Analysis of Secure Wireless Local Area Network Using Test-Bed , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
[29] S. Taj,et al. Performance analysis of wireless network with the impact of security mechanisms , 2012, 2012 International Conference on Emerging Technologies.
[30] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[31] William Stallings,et al. Cryptography and network security , 1998 .
[32] Pan Feng,et al. Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).
[33] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[34] Ved Prakash Gulati,et al. Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach , 2005, ISPEC.
[35] Poonam Jindal,et al. Impact of transmission power on the performance of secure wireless local area network , 2014, 2014 Students Conference on Engineering and Systems.
[36] Seong-Moo Yoo,et al. The Insecurity of Wireless Networks , 2012, IEEE Security & Privacy.
[37] Nilufar Baghaei,et al. Security performance of loaded IEEE 802.11b wireless networks , 2004, Comput. Commun..
[38] H. P. Sinha,et al. Impact of Security Algorithms on Various Performance Metrics of Wireless LAN , 2022 .