Search dblp for Publications

export results for "WLAN Security."

 download as .bib file

@article{DBLP:journals/ton/YehGAMK24,
  author       = {Chia{-}Yi Yeh and
                  Yasaman Ghasempour and
                  Yasith Amarasinghe and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  title        = {Security and Angle-Frequency Coupling in Terahertz WLANs},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {2},
  pages        = {1524--1539},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2023.3321641},
  doi          = {10.1109/TNET.2023.3321641},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YehGAMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/VermaKK22,
  author       = {Shikhar Verma and
                  Yuichi Kawamoto and
                  Nei Kato},
  title        = {A Smart Internet-Wide Port Scan Approach for Improving IoT Security
                  Under Dynamic {WLAN} Environments},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {14},
  pages        = {11951--11961},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3132389},
  doi          = {10.1109/JIOT.2021.3132389},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/VermaKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/LindroosHV22,
  author       = {Saku Lindroos and
                  Antti Hakkala and
                  Seppo Virtanen},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {The {COVID-19} pandemic and remote working did not improve {WLAN}
                  security},
  booktitle    = {The 13th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2022) / The 5th International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2022) / Affiliated Workshops, March
                  22-25, 2022, Porto, Portugal},
  series       = {Procedia Computer Science},
  volume       = {201},
  pages        = {158--165},
  publisher    = {Elsevier},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.procs.2022.03.023},
  doi          = {10.1016/J.PROCS.2022.03.023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/LindroosHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LindroosHV21,
  author       = {Saku Lindroos and
                  Antti Hakkala and
                  Seppo Virtanen},
  title        = {A systematic methodology for continuous {WLAN} abundance and security
                  analysis},
  journal      = {Comput. Networks},
  volume       = {197},
  pages        = {108359},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108359},
  doi          = {10.1016/J.COMNET.2021.108359},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LindroosHV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/VermaKK21,
  author       = {Shikhar Verma and
                  Yuichi Kawamoto and
                  Nei Kato},
  title        = {A Network-Aware Internet-Wide Scan for Security Maximization of IPv6-Enabled
                  {WLAN} IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {8411--8422},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3045733},
  doi          = {10.1109/JIOT.2020.3045733},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/VermaKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YehGAMK20,
  author       = {Chia{-}Yi Yeh and
                  Yasaman Ghasempour and
                  Yasith Amarasinghe and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Security in terahertz WLANs with Leaky wave antennas},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {317--327},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399365},
  doi          = {10.1145/3395351.3399365},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YehGAMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Abo-SolimanA18,
  author       = {Mohamed A. Abo{-}Soliman and
                  Marianne A. Azer},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Enterprise {WLAN} Security Flaws: Current Attacks and relative Mitigations},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {34:1--34:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230836},
  doi          = {10.1145/3230833.3230836},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Abo-SolimanA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csoc/LathaV18,
  author       = {P. H. Latha and
                  R. Vasantha},
  editor       = {Radek Silhavy},
  title        = {An Efficient Security System in Wireless Local Area Network {(WLAN)}
                  Against Network Intrusion},
  booktitle    = {Software Engineering and Algorithms in Intelligent Systems - Proceedings
                  of 7th Computer Science On-line Conference 2018, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {763},
  pages        = {12--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91186-1\_2},
  doi          = {10.1007/978-3-319-91186-1\_2},
  timestamp    = {Tue, 31 Jul 2018 17:45:46 +0200},
  biburl       = {https://dblp.org/rec/conf/csoc/LathaV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/LepajaMEB18,
  author       = {Salem Lepaja and
                  Arianit Maraj and
                  Iris Efendiu and
                  Shpat Berzati},
  title        = {The impact of the security mechanisms in the throughput of the {WLAN}
                  networks},
  booktitle    = {7th Mediterranean Conference on Embedded Computing, {MECO} 2018, Budva,
                  Montenegro, June 10-14, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MECO.2018.8406067},
  doi          = {10.1109/MECO.2018.8406067},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/meco/LepajaMEB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/HayajnehUMB17,
  author       = {Thaier Hayajneh and
                  Sana Ullah and
                  Bassam Jamil Mohd and
                  Kiran S. Balagani},
  title        = {An Enhanced {WLAN} Security System With {FPGA} Implementation for
                  Multimedia Applications},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {4},
  pages        = {2536--2545},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2424702},
  doi          = {10.1109/JSYST.2015.2424702},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/HayajnehUMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/KolahiA17,
  author       = {Samad S. Kolahi and
                  A. A. Almatrook},
  title        = {Impact of security on bandwidth and latency in {IEEE} 802.11ac client-to-server
                  {WLAN}},
  booktitle    = {Ninth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2017, Milan, Italy, July 4-7, 2017},
  pages        = {893--897},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICUFN.2017.7993928},
  doi          = {10.1109/ICUFN.2017.7993928},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/KolahiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/KyawAC16,
  author       = {Ar Kar Kyaw and
                  Pulin Agrawal and
                  Brian Cusack},
  title        = {Wi-Pi: a study of {WLAN} security in Auckland {CBD}},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  Canberra, Australia, February 2-5, 2016},
  pages        = {42},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2843043.2843363},
  doi          = {10.1145/2843043.2843363},
  timestamp    = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/KyawAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csndsp/KolahiCC16,
  author       = {Samad S. Kolahi and
                  Yuqing Rico Cao and
                  Hong Chen},
  title        = {Impact of {SSL} security on bandwidth and delay in {IEEE} 802.11n
                  {WLAN} using Windows 7},
  booktitle    = {10th International Symposium on Communication Systems, Networks and
                  Digital Signal Processing, {CSNDSP} 2016, Prague, Czech Republic,
                  July 20-22, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSNDSP.2016.7574043},
  doi          = {10.1109/CSNDSP.2016.7574043},
  timestamp    = {Sat, 21 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csndsp/KolahiCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiuJ15,
  author       = {Yonglei Liu and
                  Zhigang Jin},
  title        = {{SAEW:} {A} Security Assessment and Enhancement System of Wireless
                  Local Area Networks (WLANs)},
  journal      = {Wirel. Pers. Commun.},
  volume       = {82},
  number       = {1},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-014-2188-y},
  doi          = {10.1007/S11277-014-2188-Y},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiuJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MaW15,
  author       = {Hongyang Ma and
                  Shumei Wang},
  title        = {Development of Security {WLAN} Protocol Based on Quantum {GHZ} Stats},
  journal      = {Wirel. Pers. Commun.},
  volume       = {80},
  number       = {1},
  pages        = {193--202},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-014-2003-9},
  doi          = {10.1007/S11277-014-2003-9},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MaW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Kuusisto13b,
  author       = {Finn Kuusisto},
  title        = {{WLAN} Security},
  journal      = {{XRDS}},
  volume       = {20},
  number       = {1},
  pages        = {64},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517257},
  doi          = {10.1145/2517257},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Kuusisto13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lanman/QachriD13,
  author       = {Na{\"{\i}}m Qachri and
                  Jean{-}Michel Dricot},
  title        = {On the security of {WLAN} access points integrated in 4G/LTE architectures},
  booktitle    = {19th {IEEE} Workshop on Local {\&} Metropolitan Area Networks,
                  {LANMAN} 2013, Brussels, Belgium, April 10-12, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/LANMAN.2013.6528291},
  doi          = {10.1109/LANMAN.2013.6528291},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lanman/QachriD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/13/SaidGB13,
  author       = {Siwar Ben Hadj Said and
                  Karine Guillouard and
                  Jean{-}Marie Bonnin},
  editor       = {Shafiullah Khan and
                  Al{-}Sakib Khan Pathan},
  title        = {A Comparative Study on Security Implementation in {EPS/LTE} and {WLAN/802.11}},
  booktitle    = {Wireless Networks and Security, Issues, Challenges and Research Trends},
  pages        = {457--489},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36169-2\_14},
  doi          = {10.1007/978-3-642-36169-2\_14},
  timestamp    = {Thu, 14 Oct 2021 08:45:59 +0200},
  biburl       = {https://dblp.org/rec/books/sp/13/SaidGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgct/IdrissiZJ12,
  author       = {Younes El Hajjaji El Idrissi and
                  Noureddine Zahid and
                  Mohamed Jedra},
  title        = {Security analysis of 3GPP {(LTE)} - {WLAN} interworking and a new
                  local authentication method based on {EAP-AKA}},
  booktitle    = {First International Conference on Future Generation Communication
                  Technologies {(FGST} 2012), London, United Kingdom, December 12-14,
                  2012},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/FGCT.2012.6476561},
  doi          = {10.1109/FGCT.2012.6476561},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fgct/IdrissiZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/KolahiLAS12,
  author       = {Samad Salehi Kolahi and
                  Peng Li and
                  Mulugeta Argawe and
                  Mustafa Safdari},
  title        = {{WPA2} security-bandwith trade-off in 802.11n peer-peer {WLAN} for
                  IPv4 and IPv6 using Windows {XP} and Windows 7 operating systems},
  booktitle    = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012,
                  Cappadocia, Turkey, July 1-4, 2012},
  pages        = {575--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCC.2012.6249358},
  doi          = {10.1109/ISCC.2012.6249358},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/KolahiLAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangSB11,
  author       = {Li Wang and
                  Bala Srinivasan and
                  Nandita Bhattacharjee},
  title        = {Security Analysis and Improvements on WLANs},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {470--481},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.470-481},
  doi          = {10.4304/JNW.6.3.470-481},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BeraGD11,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {A {WLAN} security management framework based on formal spatio-temporal
                  {RBAC} model},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {9},
  pages        = {981--993},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.232},
  doi          = {10.1002/SEC.232},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BeraGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeecmc/ShiZQSZL11,
  author       = {Wenjun Shi and
                  Yuan Zhou and
                  Zhihong Qian and
                  Kecheng Shang and
                  Xiaofan Zhang and
                  Meng Li},
  editor       = {Dongfeng Yuan and
                  Maoyong Cao and
                  Cheng{-}Xiang Wang and
                  Hua Huang},
  title        = {A Security Policy of {WLAN} Data Transmission Based on Logistic Chaotic
                  Modulation},
  booktitle    = {Third International Conference on Communications and Mobile Computing,
                  {CMC} 2011, Qingdao, China, 18-20 April 2011},
  pages        = {3--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CMC.2011.15},
  doi          = {10.1109/CMC.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeecmc/ShiZQSZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/BarnickelM11,
  author       = {Johannes Barnickel and
                  Ulrike Meyer},
  editor       = {Chun Tung Chou and
                  Tom Pfeifer and
                  Anura P. Jayasumana},
  title        = {Security and privacy for {WLAN} roaming with per-connection tariff
                  negotiation},
  booktitle    = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn,
                  Germany, October 4-7, 2011},
  pages        = {424--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCN.2011.6115502},
  doi          = {10.1109/LCN.2011.6115502},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/BarnickelM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/Majstor11c,
  author       = {Franjo Majstor},
  editor       = {Rebecca Herold},
  title        = {Wireless Local Area Networks (WLANs): Security},
  booktitle    = {Encyclopedia of Information Assurance},
  publisher    = {Taylor {\&} Francis},
  year         = {2011},
  url          = {https://doi.org/10.1081/E-EIA-120046321},
  doi          = {10.1081/E-EIA-120046321},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/Majstor11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ToubianaLRG10,
  author       = {Vincent Toubiana and
                  Houda Labiod and
                  Laurent Reynaud and
                  Yvon Gourhant},
  title        = {A global security architecture for operated hybrid {WLAN} mesh networks},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {2},
  pages        = {218--230},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2009.05.016},
  doi          = {10.1016/J.COMNET.2009.05.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ToubianaLRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/ChowdhuryM10,
  author       = {Sarwarul Chowdhury and
                  Martin Maier},
  title        = {Security Issues in Integrated {EPON} and Next-Generation {WLAN} Networks},
  booktitle    = {7th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2010, Las Vegas, NV, USA, January 9-12, 2010},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CCNC.2010.5421795},
  doi          = {10.1109/CCNC.2010.5421795},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/ChowdhuryM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icarcv/ShankarRD10,
  author       = {Ramalingam Shankar and
                  Timothy Rajkumar and
                  Perumal Dananjayan},
  title        = {Security enhancement with optimal QoS using {ECDH} for converged 3G-WLAN
                  system},
  booktitle    = {11th International Conference on Control, Automation, Robotics and
                  Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings},
  pages        = {1709--1713},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICARCV.2010.5707889},
  doi          = {10.1109/ICARCV.2010.5707889},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icarcv/ShankarRD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MillikenM10,
  author       = {Jonny Milliken and
                  Alan Marshall},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {The Threat-Victim Table - {A} Security Prioritisation Framework For
                  Diverse {WLAN} Network Topographies},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {37--42},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MillikenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MaityBG10,
  author       = {Soumya Maity and
                  Padmalochan Bera and
                  Soumya Kanti Ghosh},
  editor       = {Oleg B. Makarevich and
                  Atilla El{\c{c}}i and
                  Mehmet A. Orgun and
                  Sorin A. Huss and
                  Ludmila K. Babenko and
                  Alexander G. Chefranov and
                  Vijay Varadharajan},
  title        = {A mobile {IP} based {WLAN} security management framework with reconfigurable
                  hardware acceleration},
  booktitle    = {Proceedings of the 3rd International Conference on Security of Information
                  and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
                  7-11, 2010},
  pages        = {218--223},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854099.1854143},
  doi          = {10.1145/1854099.1854143},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MaityBG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-5165,
  author       = {Ramalingam Shankar and
                  Timothy Rajkumar and
                  Perumal Dananjayan},
  title        = {Security Enhancement With Optimal {QOS} Using {EAP-AKA} In Hybrid
                  Coupled 3G-WLAN Convergence Network},
  journal      = {CoRR},
  volume       = {abs/1007.5165},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.5165},
  eprinttype    = {arXiv},
  eprint       = {1007.5165},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-5165.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ErtaulC09,
  author       = {Levent Ertaul and
                  Omicel Catambay},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Today {\&} Tomorrow: {IEEE} 802.11 {WLAN} Security},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {73--77},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ErtaulC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WatanabeT09,
  author       = {Ryu Watanabe and
                  Toshiaki Tanaka},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Denial of Service Attack Resilience on Area Expanded {WLAN} Services},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {258--264},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WatanabeT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/KadlecKV09,
  author       = {Jaroslav Kadlec and
                  Radek Kuchta and
                  Radimir Vrba},
  title        = {Comparison of the WLAN's security functions time consumption},
  booktitle    = {16th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December,
                  2009},
  pages        = {920--923},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICECS.2009.5410827},
  doi          = {10.1109/ICECS.2009.5410827},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/KadlecKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icumt/KannanRP09,
  author       = {P. Muthu Kannan and
                  Swaminathan Ramamurthy and
                  V. Palanisamy},
  title        = {Enhancing {WLAN} security with sectored antennas},
  booktitle    = {Proceedings of the International Conference on Ultra Modern Telecommunications,
                  {ICUMT} 2009, 12-14 October 2009, St. Petersburg, Russia},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICUMT.2009.5345605},
  doi          = {10.1109/ICUMT.2009.5345605},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icumt/KannanRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/KolahiQSC09,
  author       = {Samad S. Kolahi and
                  Zhang Qu and
                  Burjiz K. Soorty and
                  Navneet Chand},
  editor       = {Sungwon Sohn and
                  Ling Chen and
                  Soonwook Hwang and
                  Kyungeun Cho and
                  Shigeo Kawata and
                  Kyhyun Um and
                  Franz I. S. Ko and
                  Kae{-}Dal Kwack and
                  Jong Hyung Lee and
                  Gang Kou and
                  Kiyoshi Nakamura and
                  Alvis Cheuk M. Fong and
                  Patrick C. M. Ma},
  title        = {The performance of IPv4 and IPv6 using {UDP} on {IEEE} 802.11n WLANs
                  with {WPA2} security},
  booktitle    = {Proceedings of the 2nd International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea,
                  24-26 November 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {873--876},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655925.1656084},
  doi          = {10.1145/1655925.1656084},
  timestamp    = {Sun, 28 Feb 2021 18:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/KolahiQSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wts/MunHK09,
  author       = {Hyeran Mun and
                  Kyusuk Han and
                  Kwangjo Kim},
  title        = {3G-WLAN interworking: security analysis and new authentication and
                  key agreement based on {EAP-AKA}},
  booktitle    = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech
                  Republic, April 22-24, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WTS.2009.5068983},
  doi          = {10.1109/WTS.2009.5068983},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wts/MunHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/ChandramathiADSV08,
  author       = {Soundararajan Chandramathi and
                  K. V. Arunkumar and
                  S. Deivarayan and
                  P. Sendhilkumar and
                  K. Vaithiyanathan},
  title        = {Modified {WEP} key management for enhancing {WLAN} security},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {1},
  number       = {3/4},
  pages        = {437--452},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICT.2008.024014},
  doi          = {10.1504/IJICT.2008.024014},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/ChandramathiADSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/ObaidatG08,
  author       = {Mohammad S. Obaidat and
                  Tarik Guelzim},
  title        = {A New Security Access Scheme for WLANs and Its Performance Simulation
                  Analysis},
  journal      = {Simul.},
  volume       = {84},
  number       = {6},
  pages        = {311--321},
  year         = {2008},
  url          = {https://doi.org/10.1177/0037549708096108},
  doi          = {10.1177/0037549708096108},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/ObaidatG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/HsuL08,
  author       = {Shih{-}Feng Hsu and
                  Yi{-}Bing Lin},
  title        = {Selecting transition process for {WLAN} security},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {8},
  number       = {7},
  pages        = {921--925},
  year         = {2008},
  url          = {https://doi.org/10.1002/wcm.538},
  doi          = {10.1002/WCM.538},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/HsuL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/JiangLYC08,
  author       = {Yixin Jiang and
                  Chuang Lin and
                  Hao Yin and
                  Zhen Chen},
  title        = {A mutual authentication and privacy mechanism for {WLAN} security},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {101--112},
  year         = {2008},
  url          = {https://doi.org/10.1002/wcm.448},
  doi          = {10.1002/WCM.448},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/JiangLYC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsware/ChandramathiADS08,
  author       = {Soundararajan Chandramathi and
                  K. V. Arunkumar and
                  S. Deivarayan and
                  P. Sendhilkumar},
  editor       = {Sunghyun Choi and
                  Jim Kurose and
                  Krithi Ramamritham},
  title        = {Fuzzy based dynamic {WEP} keymanagement for {WLAN} security enhancement},
  booktitle    = {Proceedings of the Third International Conference on COMmunication
                  System softWAre and MiddlewaRE {(COMSWARE} 2008), January 5-10, 2008,
                  Bangalore, India},
  pages        = {409--414},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMSWA.2008.4554449},
  doi          = {10.1109/COMSWA.2008.4554449},
  timestamp    = {Thu, 04 Nov 2021 14:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/comsware/ChandramathiADS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GuYQXJ08,
  author       = {Wenjun Gu and
                  Zhimin Yang and
                  Can Que and
                  Dong Xuan and
                  Weijia Jia},
  title        = {On Security Vulnerabilities of Null Data Frames in {IEEE} 802.11 Based
                  WLANs},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages        = {28--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.2008.17},
  doi          = {10.1109/ICDCS.2008.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GuYQXJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iske/WangLCL08,
  author       = {Zhiwen Wang and
                  Meizhen Liu and
                  Qixian Cai and
                  Jie Li},
  title        = {Improving Project for security and secrecy's risk of {WLAN} management},
  booktitle    = {3rd International Conference on Intelligent System and Knowledge Engineering,
                  {ISKE} 2008, Xiamen, China, November 17-19, 2008},
  pages        = {1460--1465},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISKE.2008.4731162},
  doi          = {10.1109/ISKE.2008.4731162},
  timestamp    = {Wed, 10 Nov 2021 12:36:01 +0100},
  biburl       = {https://dblp.org/rec/conf/iske/WangLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/KraetzerDM08,
  author       = {Christian Kraetzer and
                  Jana Dittmann and
                  Ronny Merkel},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong and
                  Jana Dittmann and
                  Nasir D. Memon},
  title        = {{WLAN} steganography revisited},
  booktitle    = {Security, Forensics, Steganography, and Watermarking of Multimedia
                  Contents X, San Jose, CA, USA, January 27, 2008},
  series       = {{SPIE} Proceedings},
  volume       = {6819},
  pages        = {681903},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.764557},
  doi          = {10.1117/12.764557},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/KraetzerDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/GritzalisL08,
  author       = {Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  title        = {{IEEE} 802.11 Wireless LANs (WLANs): Security},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043913},
  doi          = {10.1081/E-EWMC-120043913},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/GritzalisL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/KrishnanVW08,
  author       = {S. P. T. Krishnan and
                  Bharadwaj Veeravalli and
                  Lawrence W. C. Wong},
  title        = {Wireless LANs (WLANs): Security and Privacy},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043609},
  doi          = {10.1081/E-EWMC-120043609},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/KrishnanVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BoulmalfBL07,
  author       = {Mohammed Boulmalf and
                  Ezedin Barka and
                  Abderrahmane Lakas},
  title        = {Analysis of the effect of security on data and voice traffic in {WLAN}},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {11-12},
  pages        = {2468--2477},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2007.04.024},
  doi          = {10.1016/J.COMCOM.2007.04.024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/BoulmalfBL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ism/IssacM07,
  author       = {Biju Issac and
                  Lawan A. Mohammed},
  title        = {War Driving and {WLAN} Security Issues - Attacks, Security Design
                  and Remedies},
  journal      = {Inf. Syst. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {289--298},
  year         = {2007},
  url          = {https://doi.org/10.1080/10580530701585831},
  doi          = {10.1080/10580530701585831},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ism/IssacM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/BarkaB07,
  author       = {Ezedin Barka and
                  Mohammed Boulmalf},
  title        = {On the Impact of Security on the Performance of WLANs},
  journal      = {J. Commun.},
  volume       = {2},
  number       = {4},
  pages        = {10--17},
  year         = {2007},
  url          = {https://doi.org/10.4304/jcm.2.4.10-17},
  doi          = {10.4304/JCM.2.4.10-17},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/BarkaB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SherM07,
  author       = {Muhammad Sher and
                  Thomas Magedanz},
  title        = {3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security
                  Model},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {198--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.1},
  doi          = {10.1109/ARES.2007.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SherM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiMM07,
  author       = {Xinghua Li and
                  Jianfeng Ma and
                  Sang{-}Jae Moon},
  editor       = {Keqiu Li and
                  Chris R. Jesshope and
                  Hai Jin and
                  Jean{-}Luc Gaudiot},
  title        = {Security Analysis of the Authentication Modules of Chinese {WLAN}
                  Standard and Its Implementation Plan},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2007, Dalian, China, September 18-21, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4672},
  pages        = {306--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74784-0\_32},
  doi          = {10.1007/978-3-540-74784-0\_32},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LiMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Lipiczky07,
  author       = {Bill Lipiczky},
  editor       = {Harold F. Tipton and
                  Micki Krause},
  title        = {Voice over {WLAN}},
  booktitle    = {Information security management handbook, Sixth Edition},
  pages        = {1997--2006},
  publisher    = {Auerbach Publ./CRC Press},
  year         = {2007},
  url          = {https://doi.org/10.1201/9781439833032.ch147},
  doi          = {10.1201/9781439833032.CH147},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Lipiczky07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Majstor07a,
  author       = {Franjo Majstor},
  editor       = {Harold F. Tipton and
                  Micki Krause},
  title        = {{WLAN} Security Update},
  booktitle    = {Information security management handbook, Sixth Edition},
  pages        = {1761--1776},
  publisher    = {Auerbach Publ./CRC Press},
  year         = {2007},
  url          = {https://doi.org/10.1201/9781439833032.ch133},
  doi          = {10.1201/9781439833032.CH133},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Majstor07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang07,
  author       = {Qiang Tang},
  title        = {On the Security of three Versions of the {WAI} Protocol in Chinese
                  {WLAN} Implementation Plan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/122},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangCY06,
  author       = {Chou Chen Yang and
                  Kuan{-}Hao Chu and
                  Ya{-}Wen Yang},
  title        = {3G and {WLAN} Interworking Security: Current Status and Key},
  journal      = {Int. J. Netw. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--13},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p1-13.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangCY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/XiaoBDPD06,
  author       = {Yang Xiao and
                  Chaitanya Bandela and
                  Xiaojiang Du and
                  Yi Pan and
                  Edilbert Kamal Dass},
  title        = {Security mechanisms, attacks and security enhancements for the {IEEE}
                  802.11 WLANs},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {1},
  number       = {3/4},
  pages        = {276--288},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJWMC.2006.012562},
  doi          = {10.1504/IJWMC.2006.012562},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/XiaoBDPD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KeeratiwintakornK06,
  author       = {Phongsak Keeratiwintakorn and
                  Prashant Krishnamurthy},
  title        = {An energy efficient security protocol for {IEEE} 802.11 WLANs},
  journal      = {Pervasive Mob. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {204--231},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.pmcj.2005.11.002},
  doi          = {10.1016/J.PMCJ.2005.11.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/KeeratiwintakornK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/SmythMM06,
  author       = {Neil Smyth and
                  M{\'{a}}ire McLoone and
                  John V. McCanny},
  title        = {{WLAN} security processor},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {53-I},
  number       = {7},
  pages        = {1506--1520},
  year         = {2006},
  url          = {https://doi.org/10.1109/TCSI.2006.877888},
  doi          = {10.1109/TCSI.2006.877888},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/SmythMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/ShihK06,
  author       = {Chih{-}Mou Shih and
                  Shang{-}Juh Kao},
  title        = {Security Gateway for Accessing IPv6 {WLAN}},
  booktitle    = {5th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2006) and 1st {IEEE/ACIS} International Workshop on
                  Component-Based Software Engineering, Software Architecture and Reuse
                  {(COMSAR} 2006), 10-12 July 2006, Honolulu, Hawaii, {USA}},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIS-COMSAR.2006.76},
  doi          = {10.1109/ICIS-COMSAR.2006.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/ShihK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiMM06,
  author       = {Xinghua Li and
                  Sang{-}Jae Moon and
                  Jianfeng Ma},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {On the Security of the Authentication Module of Chinese {WLAN} Standard
                  Implementation Plan},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {340--348},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_23},
  doi          = {10.1007/11767480\_23},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhaoLY06,
  author       = {Yao Zhao and
                  Chuang Lin and
                  Hao Yin},
  title        = {Security Authentication of 3G-WLAN Interworking},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {429--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.300},
  doi          = {10.1109/AINA.2006.300},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/ZhaoLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/SithirasenanZM06,
  author       = {Elankayer Sithirasenan and
                  Saad Zafar and
                  Vallipuram Muthukkumarasamy},
  title        = {Formal Verification of the {IEEE} 802.11i {WLAN} Security Protocol},
  booktitle    = {17th Australian Software Engineering Conference {(ASWEC} 2006), 18-21
                  April 2006, Sydney, Australia},
  pages        = {181--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ASWEC.2006.29},
  doi          = {10.1109/ASWEC.2006.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aswec/SithirasenanZM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/KebreauCP06,
  author       = {Sabine Kebreau and
                  Barbu Constantinescu and
                  Samuel Pierre},
  title        = {A New Security Approach for {WLAN}},
  booktitle    = {Proceedings of the Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre,
                  Ottawa, Canada},
  pages        = {1801--1804},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCECE.2006.277674},
  doi          = {10.1109/CCECE.2006.277674},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/KebreauCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/UrienDB06,
  author       = {Pascal Urien and
                  Mesmin Dandjinou and
                  Mohamad Badra},
  editor       = {Sanguthevar Rajasekaran},
  title        = {Introducing trusted {EAP} module for security enhancement in WLANs
                  and VPNs},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {191--198},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 13:40:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/UrienDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/BarkaMH06,
  author       = {Ezedin Barka and
                  Emad Eldin Mohamed and
                  Kadhim Hayawi},
  editor       = {Seizo Onoe and
                  Mohsen Guizani and
                  Hsiao{-}Hwa Chen and
                  Mamoru Sawahashi},
  title        = {End-to-end security solutions for {WLAN:} a performance analysis for
                  the underlying encryption algorithms in the lightweight devices},
  booktitle    = {Proceedings of the International Conference on Wireless Communications
                  and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada,
                  July 3-6, 2006},
  pages        = {1295--1300},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143549.1143809},
  doi          = {10.1145/1143549.1143809},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/BarkaMH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aintec/NagamalaiDSLL05,
  author       = {Dhinaharan Nagamalai and
                  Beatrice Cynthia Dhinakaran and
                  P. Sasikala and
                  Seoung{-}Hyeon Lee and
                  Jae{-}Kwang Lee},
  editor       = {Kenjiro Cho and
                  Philippe Jacquet},
  title        = {Security Threats and Countermeasures in {WLAN}},
  booktitle    = {Technologies for Advanced Heterogeneous Networks, First Asian Internet
                  Engineering Conference, {AINTEC} 2005, Bangkok, Thailand, December
                  13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3837},
  pages        = {168--182},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599593\_13},
  doi          = {10.1007/11599593\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aintec/NagamalaiDSLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/FathiKCIP05,
  author       = {Hanane Fathi and
                  Kazukuni Kobara and
                  Shyam S. Chakraborty and
                  Hideki Imai and
                  Ramjee Prasad},
  title        = {On the impact of security on latency in {WLAN} 802.11b},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM}
                  '05, St. Louis, Missouri, USA, 28 November - 2 December 2005},
  pages        = {5},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/GLOCOM.2005.1577950},
  doi          = {10.1109/GLOCOM.2005.1577950},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/FathiKCIP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XiaoBP05,
  author       = {Yang Xiao and
                  Chaitanya Bandela and
                  Yi Pan},
  title        = {Vulnerabilities and security enhancements for the {IEEE} 802.11 WLANs},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM}
                  '05, St. Louis, Missouri, USA, 28 November - 2 December 2005},
  pages        = {5},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/GLOCOM.2005.1577931},
  doi          = {10.1109/GLOCOM.2005.1577931},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/XiaoBP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhangWDC05,
  author       = {Longjun Zhang and
                  Han Wei and
                  Dong Zheng and
                  Kefei Chen},
  title        = {A Security Solution of {WLAN} Based on Public Key Cryptosystem},
  booktitle    = {11th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages        = {422--427},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPADS.2005.46},
  doi          = {10.1109/ICPADS.2005.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhangWDC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/CalikliC05,
  author       = {Handan G{\"{u}}l {\c{C}}alikli and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {A Formal Policy Specification Language for an 802.11 {WLAN} with Enhanced
                  Security Network},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {183--192},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_21},
  doi          = {10.1007/11569596\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/CalikliC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhengPW04,
  author       = {Qing{-}Hua Zheng and
                  David L. Pepyne and
                  Qing Wang},
  title        = {New Approach to {WLAN} Security with Synchronized Pseudo Random},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {19},
  number       = {6},
  pages        = {920--927},
  year         = {2004},
  url          = {https://doi.org/10.1007/BF02973455},
  doi          = {10.1007/BF02973455},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhengPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/BadraU04,
  author       = {Mohamad Badra and
                  Pascal Urien},
  editor       = {Pedro T. Isa{\'{\i}}as and
                  Nitya Karmakar and
                  Lu{\'{\i}}s E. T. Rodrigues and
                  Patr{\'{\i}}cia Barbosa},
  title        = {Enhancing {WLAN} Security by Introducing {EAP-TLS} Smartcards},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2004,
                  Madrid, Spain, 2 Volumes},
  pages        = {342--349},
  publisher    = {{IADIS}},
  year         = {2004},
  timestamp    = {Wed, 01 Apr 2015 20:06:19 +0200},
  biburl       = {https://dblp.org/rec/conf/iadis/BadraU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KoienH03,
  author       = {Geir M. K{\o}ien and
                  Thomas Haslestad},
  title        = {Security aspects of 3G-WLAN interworking},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {41},
  number       = {11},
  pages        = {82--88},
  year         = {2003},
  url          = {https://doi.org/10.1109/MCOM.2003.1244927},
  doi          = {10.1109/MCOM.2003.1244927},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KoienH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ParkD03,
  author       = {Joon S. Park and
                  Derrick Dicoi},
  title        = {{WLAN} Security: Current and Future},
  journal      = {{IEEE} Internet Comput.},
  volume       = {7},
  number       = {5},
  pages        = {60--65},
  year         = {2003},
  url          = {https://doi.org/10.1109/MIC.2003.1232519},
  doi          = {10.1109/MIC.2003.1232519},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ParkD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/DharmadhikariSAC03,
  author       = {Abhay Dharmadhikari and
                  Uttam Sengupta and
                  Ameen Ahmad and
                  Roger Chandler},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {{SIM} Based {WLAN} Authentication for Open Platforms},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  pages        = {99--104},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/DharmadhikariSAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eks/X03c,
  editor       = {Tom J. van Weert},
  title        = {Conference on Security in Wireless Local Area Networks: Vienna Declaration
                  - On Wireless Local Area Networks (WLANs)},
  booktitle    = {Education and the Knowledge Society - Information Technology supporting
                  human development [Engineering the Knowledge Society {(EKS)} - Event
                  of the World Summit on the Information Society (WSIS), joint event
                  of the World Federation of Engineering Organisations {(WFEO)} and
                  IFIP, held during the World Summit on the Information Society {(WSIS)}
                  in Geneva, Switzerland, December 11-12, 2003]},
  series       = {{IFIP}},
  volume       = {161},
  pages        = {301--303},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/0-387-23120-X\_33},
  doi          = {10.1007/0-387-23120-X\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eks/X03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/Majstor03,
  author       = {Franjo Majstor},
  title        = {{WLAN} Security Threats {\&} Solutions},
  booktitle    = {28th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2003),
                  The Conference on Leading Edge and Practical Computer Networking,
                  20-24 October 2003, Bonn/K{\"{o}}nigswinter, Germany, Proceedings},
  pages        = {650},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/LCN.2003.1243197},
  doi          = {10.1109/LCN.2003.1243197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/Majstor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/KongJH02,
  author       = {Hyung Yun Kong and
                  Il{-}Han Jeong and
                  Kwang{-}Chun Ho},
  title        = {Security Architecture Using {RCNC} Code and M-Sequence for WLANs},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {11},
  pages        = {2547--2550},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_11\_2547},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KongJH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics