![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "WLAN Security."
@article{DBLP:journals/ton/YehGAMK24, author = {Chia{-}Yi Yeh and Yasaman Ghasempour and Yasith Amarasinghe and Daniel M. Mittleman and Edward W. Knightly}, title = {Security and Angle-Frequency Coupling in Terahertz WLANs}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {32}, number = {2}, pages = {1524--1539}, year = {2024}, url = {https://doi.org/10.1109/TNET.2023.3321641}, doi = {10.1109/TNET.2023.3321641}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YehGAMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/VermaKK22, author = {Shikhar Verma and Yuichi Kawamoto and Nei Kato}, title = {A Smart Internet-Wide Port Scan Approach for Improving IoT Security Under Dynamic {WLAN} Environments}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {14}, pages = {11951--11961}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3132389}, doi = {10.1109/JIOT.2021.3132389}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/VermaKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/LindroosHV22, author = {Saku Lindroos and Antti Hakkala and Seppo Virtanen}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {The {COVID-19} pandemic and remote working did not improve {WLAN} security}, booktitle = {The 13th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2022) / The 5th International Conference on Emerging Data and Industry 4.0 {(EDI40} 2022) / Affiliated Workshops, March 22-25, 2022, Porto, Portugal}, series = {Procedia Computer Science}, volume = {201}, pages = {158--165}, publisher = {Elsevier}, year = {2022}, url = {https://doi.org/10.1016/j.procs.2022.03.023}, doi = {10.1016/J.PROCS.2022.03.023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/LindroosHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LindroosHV21, author = {Saku Lindroos and Antti Hakkala and Seppo Virtanen}, title = {A systematic methodology for continuous {WLAN} abundance and security analysis}, journal = {Comput. Networks}, volume = {197}, pages = {108359}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108359}, doi = {10.1016/J.COMNET.2021.108359}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LindroosHV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/VermaKK21, author = {Shikhar Verma and Yuichi Kawamoto and Nei Kato}, title = {A Network-Aware Internet-Wide Scan for Security Maximization of IPv6-Enabled {WLAN} IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {8411--8422}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3045733}, doi = {10.1109/JIOT.2020.3045733}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/VermaKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YehGAMK20, author = {Chia{-}Yi Yeh and Yasaman Ghasempour and Yasith Amarasinghe and Daniel M. Mittleman and Edward W. Knightly}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Security in terahertz WLANs with Leaky wave antennas}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {317--327}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399365}, doi = {10.1145/3395351.3399365}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YehGAMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Abo-SolimanA18, author = {Mohamed A. Abo{-}Soliman and Marianne A. Azer}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Enterprise {WLAN} Security Flaws: Current Attacks and relative Mitigations}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {34:1--34:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230836}, doi = {10.1145/3230833.3230836}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Abo-SolimanA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csoc/LathaV18, author = {P. H. Latha and R. Vasantha}, editor = {Radek Silhavy}, title = {An Efficient Security System in Wireless Local Area Network {(WLAN)} Against Network Intrusion}, booktitle = {Software Engineering and Algorithms in Intelligent Systems - Proceedings of 7th Computer Science On-line Conference 2018, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {763}, pages = {12--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91186-1\_2}, doi = {10.1007/978-3-319-91186-1\_2}, timestamp = {Tue, 31 Jul 2018 17:45:46 +0200}, biburl = {https://dblp.org/rec/conf/csoc/LathaV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/LepajaMEB18, author = {Salem Lepaja and Arianit Maraj and Iris Efendiu and Shpat Berzati}, title = {The impact of the security mechanisms in the throughput of the {WLAN} networks}, booktitle = {7th Mediterranean Conference on Embedded Computing, {MECO} 2018, Budva, Montenegro, June 10-14, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MECO.2018.8406067}, doi = {10.1109/MECO.2018.8406067}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/LepajaMEB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/HayajnehUMB17, author = {Thaier Hayajneh and Sana Ullah and Bassam Jamil Mohd and Kiran S. Balagani}, title = {An Enhanced {WLAN} Security System With {FPGA} Implementation for Multimedia Applications}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {4}, pages = {2536--2545}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2424702}, doi = {10.1109/JSYST.2015.2424702}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/HayajnehUMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/KolahiA17, author = {Samad S. Kolahi and A. A. Almatrook}, title = {Impact of security on bandwidth and latency in {IEEE} 802.11ac client-to-server {WLAN}}, booktitle = {Ninth International Conference on Ubiquitous and Future Networks, {ICUFN} 2017, Milan, Italy, July 4-7, 2017}, pages = {893--897}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICUFN.2017.7993928}, doi = {10.1109/ICUFN.2017.7993928}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icufn/KolahiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/KyawAC16, author = {Ar Kar Kyaw and Pulin Agrawal and Brian Cusack}, title = {Wi-Pi: a study of {WLAN} security in Auckland {CBD}}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, Canberra, Australia, February 2-5, 2016}, pages = {42}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2843043.2843363}, doi = {10.1145/2843043.2843363}, timestamp = {Mon, 26 Nov 2018 12:14:45 +0100}, biburl = {https://dblp.org/rec/conf/acsc/KyawAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csndsp/KolahiCC16, author = {Samad S. Kolahi and Yuqing Rico Cao and Hong Chen}, title = {Impact of {SSL} security on bandwidth and delay in {IEEE} 802.11n {WLAN} using Windows 7}, booktitle = {10th International Symposium on Communication Systems, Networks and Digital Signal Processing, {CSNDSP} 2016, Prague, Czech Republic, July 20-22, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CSNDSP.2016.7574043}, doi = {10.1109/CSNDSP.2016.7574043}, timestamp = {Sat, 21 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csndsp/KolahiCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiuJ15, author = {Yonglei Liu and Zhigang Jin}, title = {{SAEW:} {A} Security Assessment and Enhancement System of Wireless Local Area Networks (WLANs)}, journal = {Wirel. Pers. Commun.}, volume = {82}, number = {1}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.1007/s11277-014-2188-y}, doi = {10.1007/S11277-014-2188-Y}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MaW15, author = {Hongyang Ma and Shumei Wang}, title = {Development of Security {WLAN} Protocol Based on Quantum {GHZ} Stats}, journal = {Wirel. Pers. Commun.}, volume = {80}, number = {1}, pages = {193--202}, year = {2015}, url = {https://doi.org/10.1007/s11277-014-2003-9}, doi = {10.1007/S11277-014-2003-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MaW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Kuusisto13b, author = {Finn Kuusisto}, title = {{WLAN} Security}, journal = {{XRDS}}, volume = {20}, number = {1}, pages = {64}, year = {2013}, url = {https://doi.org/10.1145/2517257}, doi = {10.1145/2517257}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Kuusisto13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/QachriD13, author = {Na{\"{\i}}m Qachri and Jean{-}Michel Dricot}, title = {On the security of {WLAN} access points integrated in 4G/LTE architectures}, booktitle = {19th {IEEE} Workshop on Local {\&} Metropolitan Area Networks, {LANMAN} 2013, Brussels, Belgium, April 10-12, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/LANMAN.2013.6528291}, doi = {10.1109/LANMAN.2013.6528291}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/lanman/QachriD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/13/SaidGB13, author = {Siwar Ben Hadj Said and Karine Guillouard and Jean{-}Marie Bonnin}, editor = {Shafiullah Khan and Al{-}Sakib Khan Pathan}, title = {A Comparative Study on Security Implementation in {EPS/LTE} and {WLAN/802.11}}, booktitle = {Wireless Networks and Security, Issues, Challenges and Research Trends}, pages = {457--489}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36169-2\_14}, doi = {10.1007/978-3-642-36169-2\_14}, timestamp = {Thu, 14 Oct 2021 08:45:59 +0200}, biburl = {https://dblp.org/rec/books/sp/13/SaidGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgct/IdrissiZJ12, author = {Younes El Hajjaji El Idrissi and Noureddine Zahid and Mohamed Jedra}, title = {Security analysis of 3GPP {(LTE)} - {WLAN} interworking and a new local authentication method based on {EAP-AKA}}, booktitle = {First International Conference on Future Generation Communication Technologies {(FGST} 2012), London, United Kingdom, December 12-14, 2012}, pages = {137--142}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/FGCT.2012.6476561}, doi = {10.1109/FGCT.2012.6476561}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fgct/IdrissiZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/KolahiLAS12, author = {Samad Salehi Kolahi and Peng Li and Mulugeta Argawe and Mustafa Safdari}, title = {{WPA2} security-bandwith trade-off in 802.11n peer-peer {WLAN} for IPv4 and IPv6 using Windows {XP} and Windows 7 operating systems}, booktitle = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012, Cappadocia, Turkey, July 1-4, 2012}, pages = {575--579}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ISCC.2012.6249358}, doi = {10.1109/ISCC.2012.6249358}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/KolahiLAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangSB11, author = {Li Wang and Bala Srinivasan and Nandita Bhattacharjee}, title = {Security Analysis and Improvements on WLANs}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {470--481}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.470-481}, doi = {10.4304/JNW.6.3.470-481}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BeraGD11, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {A {WLAN} security management framework based on formal spatio-temporal {RBAC} model}, journal = {Secur. Commun. Networks}, volume = {4}, number = {9}, pages = {981--993}, year = {2011}, url = {https://doi.org/10.1002/sec.232}, doi = {10.1002/SEC.232}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BeraGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeecmc/ShiZQSZL11, author = {Wenjun Shi and Yuan Zhou and Zhihong Qian and Kecheng Shang and Xiaofan Zhang and Meng Li}, editor = {Dongfeng Yuan and Maoyong Cao and Cheng{-}Xiang Wang and Hua Huang}, title = {A Security Policy of {WLAN} Data Transmission Based on Logistic Chaotic Modulation}, booktitle = {Third International Conference on Communications and Mobile Computing, {CMC} 2011, Qingdao, China, 18-20 April 2011}, pages = {3--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CMC.2011.15}, doi = {10.1109/CMC.2011.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeecmc/ShiZQSZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/BarnickelM11, author = {Johannes Barnickel and Ulrike Meyer}, editor = {Chun Tung Chou and Tom Pfeifer and Anura P. Jayasumana}, title = {Security and privacy for {WLAN} roaming with per-connection tariff negotiation}, booktitle = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn, Germany, October 4-7, 2011}, pages = {424--431}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/LCN.2011.6115502}, doi = {10.1109/LCN.2011.6115502}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/BarnickelM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/Majstor11c, author = {Franjo Majstor}, editor = {Rebecca Herold}, title = {Wireless Local Area Networks (WLANs): Security}, booktitle = {Encyclopedia of Information Assurance}, publisher = {Taylor {\&} Francis}, year = {2011}, url = {https://doi.org/10.1081/E-EIA-120046321}, doi = {10.1081/E-EIA-120046321}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/Majstor11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ToubianaLRG10, author = {Vincent Toubiana and Houda Labiod and Laurent Reynaud and Yvon Gourhant}, title = {A global security architecture for operated hybrid {WLAN} mesh networks}, journal = {Comput. Networks}, volume = {54}, number = {2}, pages = {218--230}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.05.016}, doi = {10.1016/J.COMNET.2009.05.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ToubianaLRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/ChowdhuryM10, author = {Sarwarul Chowdhury and Martin Maier}, title = {Security Issues in Integrated {EPON} and Next-Generation {WLAN} Networks}, booktitle = {7th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2010, Las Vegas, NV, USA, January 9-12, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CCNC.2010.5421795}, doi = {10.1109/CCNC.2010.5421795}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/ChowdhuryM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icarcv/ShankarRD10, author = {Ramalingam Shankar and Timothy Rajkumar and Perumal Dananjayan}, title = {Security enhancement with optimal QoS using {ECDH} for converged 3G-WLAN system}, booktitle = {11th International Conference on Control, Automation, Robotics and Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings}, pages = {1709--1713}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICARCV.2010.5707889}, doi = {10.1109/ICARCV.2010.5707889}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icarcv/ShankarRD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MillikenM10, author = {Jonny Milliken and Alan Marshall}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {The Threat-Victim Table - {A} Security Prioritisation Framework For Diverse {WLAN} Network Topographies}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--42}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MillikenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MaityBG10, author = {Soumya Maity and Padmalochan Bera and Soumya Kanti Ghosh}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {A mobile {IP} based {WLAN} security management framework with reconfigurable hardware acceleration}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {218--223}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854143}, doi = {10.1145/1854099.1854143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MaityBG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-5165, author = {Ramalingam Shankar and Timothy Rajkumar and Perumal Dananjayan}, title = {Security Enhancement With Optimal {QOS} Using {EAP-AKA} In Hybrid Coupled 3G-WLAN Convergence Network}, journal = {CoRR}, volume = {abs/1007.5165}, year = {2010}, url = {http://arxiv.org/abs/1007.5165}, eprinttype = {arXiv}, eprint = {1007.5165}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-5165.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ErtaulC09, author = {Levent Ertaul and Omicel Catambay}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Today {\&} Tomorrow: {IEEE} 802.11 {WLAN} Security}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {73--77}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ErtaulC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WatanabeT09, author = {Ryu Watanabe and Toshiaki Tanaka}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Denial of Service Attack Resilience on Area Expanded {WLAN} Services}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {258--264}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WatanabeT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/KadlecKV09, author = {Jaroslav Kadlec and Radek Kuchta and Radimir Vrba}, title = {Comparison of the WLAN's security functions time consumption}, booktitle = {16th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December, 2009}, pages = {920--923}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICECS.2009.5410827}, doi = {10.1109/ICECS.2009.5410827}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/KadlecKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icumt/KannanRP09, author = {P. Muthu Kannan and Swaminathan Ramamurthy and V. Palanisamy}, title = {Enhancing {WLAN} security with sectored antennas}, booktitle = {Proceedings of the International Conference on Ultra Modern Telecommunications, {ICUMT} 2009, 12-14 October 2009, St. Petersburg, Russia}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICUMT.2009.5345605}, doi = {10.1109/ICUMT.2009.5345605}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icumt/KannanRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/KolahiQSC09, author = {Samad S. Kolahi and Zhang Qu and Burjiz K. Soorty and Navneet Chand}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {The performance of IPv4 and IPv6 using {UDP} on {IEEE} 802.11n WLANs with {WPA2} security}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {873--876}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1656084}, doi = {10.1145/1655925.1656084}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/KolahiQSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wts/MunHK09, author = {Hyeran Mun and Kyusuk Han and Kwangjo Kim}, title = {3G-WLAN interworking: security analysis and new authentication and key agreement based on {EAP-AKA}}, booktitle = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech Republic, April 22-24, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WTS.2009.5068983}, doi = {10.1109/WTS.2009.5068983}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wts/MunHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/ChandramathiADSV08, author = {Soundararajan Chandramathi and K. V. Arunkumar and S. Deivarayan and P. Sendhilkumar and K. Vaithiyanathan}, title = {Modified {WEP} key management for enhancing {WLAN} security}, journal = {Int. J. Inf. Commun. Technol.}, volume = {1}, number = {3/4}, pages = {437--452}, year = {2008}, url = {https://doi.org/10.1504/IJICT.2008.024014}, doi = {10.1504/IJICT.2008.024014}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/ChandramathiADSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/ObaidatG08, author = {Mohammad S. Obaidat and Tarik Guelzim}, title = {A New Security Access Scheme for WLANs and Its Performance Simulation Analysis}, journal = {Simul.}, volume = {84}, number = {6}, pages = {311--321}, year = {2008}, url = {https://doi.org/10.1177/0037549708096108}, doi = {10.1177/0037549708096108}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/ObaidatG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/HsuL08, author = {Shih{-}Feng Hsu and Yi{-}Bing Lin}, title = {Selecting transition process for {WLAN} security}, journal = {Wirel. Commun. Mob. Comput.}, volume = {8}, number = {7}, pages = {921--925}, year = {2008}, url = {https://doi.org/10.1002/wcm.538}, doi = {10.1002/WCM.538}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/HsuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/JiangLYC08, author = {Yixin Jiang and Chuang Lin and Hao Yin and Zhen Chen}, title = {A mutual authentication and privacy mechanism for {WLAN} security}, journal = {Wirel. Commun. Mob. Comput.}, volume = {8}, number = {1}, pages = {101--112}, year = {2008}, url = {https://doi.org/10.1002/wcm.448}, doi = {10.1002/WCM.448}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/JiangLYC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsware/ChandramathiADS08, author = {Soundararajan Chandramathi and K. V. Arunkumar and S. Deivarayan and P. Sendhilkumar}, editor = {Sunghyun Choi and Jim Kurose and Krithi Ramamritham}, title = {Fuzzy based dynamic {WEP} keymanagement for {WLAN} security enhancement}, booktitle = {Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE {(COMSWARE} 2008), January 5-10, 2008, Bangalore, India}, pages = {409--414}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/COMSWA.2008.4554449}, doi = {10.1109/COMSWA.2008.4554449}, timestamp = {Thu, 04 Nov 2021 14:40:53 +0100}, biburl = {https://dblp.org/rec/conf/comsware/ChandramathiADS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GuYQXJ08, author = {Wenjun Gu and Zhimin Yang and Can Que and Dong Xuan and Weijia Jia}, title = {On Security Vulnerabilities of Null Data Frames in {IEEE} 802.11 Based WLANs}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2008), 17-20 June 2008, Beijing, China}, pages = {28--35}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.2008.17}, doi = {10.1109/ICDCS.2008.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GuYQXJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iske/WangLCL08, author = {Zhiwen Wang and Meizhen Liu and Qixian Cai and Jie Li}, title = {Improving Project for security and secrecy's risk of {WLAN} management}, booktitle = {3rd International Conference on Intelligent System and Knowledge Engineering, {ISKE} 2008, Xiamen, China, November 17-19, 2008}, pages = {1460--1465}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISKE.2008.4731162}, doi = {10.1109/ISKE.2008.4731162}, timestamp = {Wed, 10 Nov 2021 12:36:01 +0100}, biburl = {https://dblp.org/rec/conf/iske/WangLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/KraetzerDM08, author = {Christian Kraetzer and Jana Dittmann and Ronny Merkel}, editor = {Edward J. Delp III and Ping Wah Wong and Jana Dittmann and Nasir D. Memon}, title = {{WLAN} steganography revisited}, booktitle = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008}, series = {{SPIE} Proceedings}, volume = {6819}, pages = {681903}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.764557}, doi = {10.1117/12.764557}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/KraetzerDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/GritzalisL08, author = {Stefanos Gritzalis and Costas Lambrinoudakis}, title = {{IEEE} 802.11 Wireless LANs (WLANs): Security}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043913}, doi = {10.1081/E-EWMC-120043913}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/GritzalisL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/KrishnanVW08, author = {S. P. T. Krishnan and Bharadwaj Veeravalli and Lawrence W. C. Wong}, title = {Wireless LANs (WLANs): Security and Privacy}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043609}, doi = {10.1081/E-EWMC-120043609}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/KrishnanVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BoulmalfBL07, author = {Mohammed Boulmalf and Ezedin Barka and Abderrahmane Lakas}, title = {Analysis of the effect of security on data and voice traffic in {WLAN}}, journal = {Comput. Commun.}, volume = {30}, number = {11-12}, pages = {2468--2477}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2007.04.024}, doi = {10.1016/J.COMCOM.2007.04.024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/BoulmalfBL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ism/IssacM07, author = {Biju Issac and Lawan A. Mohammed}, title = {War Driving and {WLAN} Security Issues - Attacks, Security Design and Remedies}, journal = {Inf. Syst. Manag.}, volume = {24}, number = {4}, pages = {289--298}, year = {2007}, url = {https://doi.org/10.1080/10580530701585831}, doi = {10.1080/10580530701585831}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ism/IssacM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/BarkaB07, author = {Ezedin Barka and Mohammed Boulmalf}, title = {On the Impact of Security on the Performance of WLANs}, journal = {J. Commun.}, volume = {2}, number = {4}, pages = {10--17}, year = {2007}, url = {https://doi.org/10.4304/jcm.2.4.10-17}, doi = {10.4304/JCM.2.4.10-17}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/BarkaB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SherM07, author = {Muhammad Sher and Thomas Magedanz}, title = {3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {198--205}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.1}, doi = {10.1109/ARES.2007.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SherM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LiMM07, author = {Xinghua Li and Jianfeng Ma and Sang{-}Jae Moon}, editor = {Keqiu Li and Chris R. Jesshope and Hai Jin and Jean{-}Luc Gaudiot}, title = {Security Analysis of the Authentication Modules of Chinese {WLAN} Standard and Its Implementation Plan}, booktitle = {Network and Parallel Computing, {IFIP} International Conference, {NPC} 2007, Dalian, China, September 18-21, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4672}, pages = {306--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74784-0\_32}, doi = {10.1007/978-3-540-74784-0\_32}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/npc/LiMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Lipiczky07, author = {Bill Lipiczky}, editor = {Harold F. Tipton and Micki Krause}, title = {Voice over {WLAN}}, booktitle = {Information security management handbook, Sixth Edition}, pages = {1997--2006}, publisher = {Auerbach Publ./CRC Press}, year = {2007}, url = {https://doi.org/10.1201/9781439833032.ch147}, doi = {10.1201/9781439833032.CH147}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Lipiczky07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Majstor07a, author = {Franjo Majstor}, editor = {Harold F. Tipton and Micki Krause}, title = {{WLAN} Security Update}, booktitle = {Information security management handbook, Sixth Edition}, pages = {1761--1776}, publisher = {Auerbach Publ./CRC Press}, year = {2007}, url = {https://doi.org/10.1201/9781439833032.ch133}, doi = {10.1201/9781439833032.CH133}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Majstor07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tang07, author = {Qiang Tang}, title = {On the Security of three Versions of the {WAI} Protocol in Chinese {WLAN} Implementation Plan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2007}, url = {http://eprint.iacr.org/2007/122}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangCY06, author = {Chou Chen Yang and Kuan{-}Hao Chu and Ya{-}Wen Yang}, title = {3G and {WLAN} Interworking Security: Current Status and Key}, journal = {Int. J. Netw. Secur.}, volume = {2}, number = {1}, pages = {1--13}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p1-13.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YangCY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/XiaoBDPD06, author = {Yang Xiao and Chaitanya Bandela and Xiaojiang Du and Yi Pan and Edilbert Kamal Dass}, title = {Security mechanisms, attacks and security enhancements for the {IEEE} 802.11 WLANs}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {1}, number = {3/4}, pages = {276--288}, year = {2006}, url = {https://doi.org/10.1504/IJWMC.2006.012562}, doi = {10.1504/IJWMC.2006.012562}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/XiaoBDPD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/KeeratiwintakornK06, author = {Phongsak Keeratiwintakorn and Prashant Krishnamurthy}, title = {An energy efficient security protocol for {IEEE} 802.11 WLANs}, journal = {Pervasive Mob. Comput.}, volume = {2}, number = {2}, pages = {204--231}, year = {2006}, url = {https://doi.org/10.1016/j.pmcj.2005.11.002}, doi = {10.1016/J.PMCJ.2005.11.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/KeeratiwintakornK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/SmythMM06, author = {Neil Smyth and M{\'{a}}ire McLoone and John V. McCanny}, title = {{WLAN} security processor}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {53-I}, number = {7}, pages = {1506--1520}, year = {2006}, url = {https://doi.org/10.1109/TCSI.2006.877888}, doi = {10.1109/TCSI.2006.877888}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/SmythMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/ShihK06, author = {Chih{-}Mou Shih and Shang{-}Juh Kao}, title = {Security Gateway for Accessing IPv6 {WLAN}}, booktitle = {5th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2006) and 1st {IEEE/ACIS} International Workshop on Component-Based Software Engineering, Software Architecture and Reuse {(COMSAR} 2006), 10-12 July 2006, Honolulu, Hawaii, {USA}}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICIS-COMSAR.2006.76}, doi = {10.1109/ICIS-COMSAR.2006.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/ShihK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiMM06, author = {Xinghua Li and Sang{-}Jae Moon and Jianfeng Ma}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {On the Security of the Authentication Module of Chinese {WLAN} Standard Implementation Plan}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {340--348}, year = {2006}, url = {https://doi.org/10.1007/11767480\_23}, doi = {10.1007/11767480\_23}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ZhaoLY06, author = {Yao Zhao and Chuang Lin and Hao Yin}, title = {Security Authentication of 3G-WLAN Interworking}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {429--436}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.300}, doi = {10.1109/AINA.2006.300}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/ZhaoLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aswec/SithirasenanZM06, author = {Elankayer Sithirasenan and Saad Zafar and Vallipuram Muthukkumarasamy}, title = {Formal Verification of the {IEEE} 802.11i {WLAN} Security Protocol}, booktitle = {17th Australian Software Engineering Conference {(ASWEC} 2006), 18-21 April 2006, Sydney, Australia}, pages = {181--190}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ASWEC.2006.29}, doi = {10.1109/ASWEC.2006.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aswec/SithirasenanZM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/KebreauCP06, author = {Sabine Kebreau and Barbu Constantinescu and Samuel Pierre}, title = {A New Security Approach for {WLAN}}, booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, {CCECE} 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}, pages = {1801--1804}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCECE.2006.277674}, doi = {10.1109/CCECE.2006.277674}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccece/KebreauCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/UrienDB06, author = {Pascal Urien and Mesmin Dandjinou and Mohamad Badra}, editor = {Sanguthevar Rajasekaran}, title = {Introducing trusted {EAP} module for security enhancement in WLANs and VPNs}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {191--198}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 13:40:33 +0100}, biburl = {https://dblp.org/rec/conf/cnis/UrienDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/BarkaMH06, author = {Ezedin Barka and Emad Eldin Mohamed and Kadhim Hayawi}, editor = {Seizo Onoe and Mohsen Guizani and Hsiao{-}Hwa Chen and Mamoru Sawahashi}, title = {End-to-end security solutions for {WLAN:} a performance analysis for the underlying encryption algorithms in the lightweight devices}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada, July 3-6, 2006}, pages = {1295--1300}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143549.1143809}, doi = {10.1145/1143549.1143809}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/BarkaMH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/NagamalaiDSLL05, author = {Dhinaharan Nagamalai and Beatrice Cynthia Dhinakaran and P. Sasikala and Seoung{-}Hyeon Lee and Jae{-}Kwang Lee}, editor = {Kenjiro Cho and Philippe Jacquet}, title = {Security Threats and Countermeasures in {WLAN}}, booktitle = {Technologies for Advanced Heterogeneous Networks, First Asian Internet Engineering Conference, {AINTEC} 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3837}, pages = {168--182}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599593\_13}, doi = {10.1007/11599593\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/aintec/NagamalaiDSLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/FathiKCIP05, author = {Hanane Fathi and Kazukuni Kobara and Shyam S. Chakraborty and Hideki Imai and Ramjee Prasad}, title = {On the impact of security on latency in {WLAN} 802.11b}, booktitle = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM} '05, St. Louis, Missouri, USA, 28 November - 2 December 2005}, pages = {5}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/GLOCOM.2005.1577950}, doi = {10.1109/GLOCOM.2005.1577950}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/FathiKCIP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/XiaoBP05, author = {Yang Xiao and Chaitanya Bandela and Yi Pan}, title = {Vulnerabilities and security enhancements for the {IEEE} 802.11 WLANs}, booktitle = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM} '05, St. Louis, Missouri, USA, 28 November - 2 December 2005}, pages = {5}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/GLOCOM.2005.1577931}, doi = {10.1109/GLOCOM.2005.1577931}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/XiaoBP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZhangWDC05, author = {Longjun Zhang and Han Wei and Dong Zheng and Kefei Chen}, title = {A Security Solution of {WLAN} Based on Public Key Cryptosystem}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {422--427}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.46}, doi = {10.1109/ICPADS.2005.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ZhangWDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/CalikliC05, author = {Handan G{\"{u}}l {\c{C}}alikli and M. Ufuk {\c{C}}aglayan}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {A Formal Policy Specification Language for an 802.11 {WLAN} with Enhanced Security Network}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {183--192}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_21}, doi = {10.1007/11569596\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/CalikliC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhengPW04, author = {Qing{-}Hua Zheng and David L. Pepyne and Qing Wang}, title = {New Approach to {WLAN} Security with Synchronized Pseudo Random}, journal = {J. Comput. Sci. Technol.}, volume = {19}, number = {6}, pages = {920--927}, year = {2004}, url = {https://doi.org/10.1007/BF02973455}, doi = {10.1007/BF02973455}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZhengPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/BadraU04, author = {Mohamad Badra and Pascal Urien}, editor = {Pedro T. Isa{\'{\i}}as and Nitya Karmakar and Lu{\'{\i}}s E. T. Rodrigues and Patr{\'{\i}}cia Barbosa}, title = {Enhancing {WLAN} Security by Introducing {EAP-TLS} Smartcards}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes}, pages = {342--349}, publisher = {{IADIS}}, year = {2004}, timestamp = {Wed, 01 Apr 2015 20:06:19 +0200}, biburl = {https://dblp.org/rec/conf/iadis/BadraU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KoienH03, author = {Geir M. K{\o}ien and Thomas Haslestad}, title = {Security aspects of 3G-WLAN interworking}, journal = {{IEEE} Commun. Mag.}, volume = {41}, number = {11}, pages = {82--88}, year = {2003}, url = {https://doi.org/10.1109/MCOM.2003.1244927}, doi = {10.1109/MCOM.2003.1244927}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KoienH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ParkD03, author = {Joon S. Park and Derrick Dicoi}, title = {{WLAN} Security: Current and Future}, journal = {{IEEE} Internet Comput.}, volume = {7}, number = {5}, pages = {60--65}, year = {2003}, url = {https://doi.org/10.1109/MIC.2003.1232519}, doi = {10.1109/MIC.2003.1232519}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ParkD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/DharmadhikariSAC03, author = {Abhay Dharmadhikari and Uttam Sengupta and Ameen Ahmad and Roger Chandler}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {{SIM} Based {WLAN} Authentication for Open Platforms}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, pages = {99--104}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/DharmadhikariSAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eks/X03c, editor = {Tom J. van Weert}, title = {Conference on Security in Wireless Local Area Networks: Vienna Declaration - On Wireless Local Area Networks (WLANs)}, booktitle = {Education and the Knowledge Society - Information Technology supporting human development [Engineering the Knowledge Society {(EKS)} - Event of the World Summit on the Information Society (WSIS), joint event of the World Federation of Engineering Organisations {(WFEO)} and IFIP, held during the World Summit on the Information Society {(WSIS)} in Geneva, Switzerland, December 11-12, 2003]}, series = {{IFIP}}, volume = {161}, pages = {301--303}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/0-387-23120-X\_33}, doi = {10.1007/0-387-23120-X\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eks/X03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/Majstor03, author = {Franjo Majstor}, title = {{WLAN} Security Threats {\&} Solutions}, booktitle = {28th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2003), The Conference on Leading Edge and Practical Computer Networking, 20-24 October 2003, Bonn/K{\"{o}}nigswinter, Germany, Proceedings}, pages = {650}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/LCN.2003.1243197}, doi = {10.1109/LCN.2003.1243197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/Majstor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/KongJH02, author = {Hyung Yun Kong and Il{-}Han Jeong and Kwang{-}Chun Ho}, title = {Security Architecture Using {RCNC} Code and M-Sequence for WLANs}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {11}, pages = {2547--2550}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_11\_2547}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/KongJH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.