Comparative Analysis of Wireless Security Protocols: WEP vs WPA
暂无分享,去创建一个
[1] Arif Sari,et al. Addressing security challenges in WiMAX environment , 2013, SIN.
[2] Sapna Gambhir,et al. A Literature Review of Security Threats to Wireless Networks , 2014 .
[4] Arif Sari. Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks , 2014 .
[5] Arif Sari. Securing Mobile Ad-Hoc Networks Against Jamming Attacks Through Unified Security Mechanism , 2012 .
[6] Arif Sari. Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks , 2015 .
[7] Kevin Benton,et al. The Evolution of 802.11 Wireless Security , 2010 .
[8] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[9] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[10] Arif Sari. Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite , 2015 .
[11] Halil-Ibrahim Bulbul,et al. Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols , 2008, e-Forensics '08.
[12] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[13] Arif Sari,et al. Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect , 2013, 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE).
[14] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[15] Arif Sari. Security Approaches in IEEE 802.11 MANET —Performance Evaluation of USM and RAS , 2014 .
[16] Arif Sari,et al. A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .
[17] Jyh-Cheng Chen,et al. Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.
[18] Erik Tews,et al. Attacks on the WEP protocol , 2007, IACR Cryptol. ePrint Arch..
[19] Arif Sari,et al. Simulation of 802.11 Physical Layer Attacks in MANET , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[20] Daniel Rosner,et al. A practical analysis of EAP authentication methods , 2010, 9th RoEduNet IEEE International Conference.
[21] Arif Sari,et al. Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment , 2015 .
[22] Nidal M. Turab,et al. A Formal Evaluation of the Security Schemes for Wireless Networks , 2011 .
[23] L Arockiam,et al. A Survey of Denial of Service Attacks and it’s Counter measures on Wireless Network (Flooding attacks) , 2011 .
[24] Arif Sari,et al. Potential issues and impacts of ICT applications through learning process in higher education , 2013 .
[25] Arif Sari,et al. Ultra-fast Lithium cell charging architecture for Mission Critical Applications , 2014 .
[26] Arif Sari. WITHDRAWN: Influence of ICT Applications on Learning Process in Higher Education , 2014 .