- Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan:
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network. CoRR abs/1007.5165 (2010) - 2009
- Levent Ertaul, Omicel Catambay:
Today & Tomorrow: IEEE 802.11 WLAN Security. Security and Management 2009: 73-77 - Ryu Watanabe, Toshiaki Tanaka:
Denial of Service Attack Resilience on Area Expanded WLAN Services. Security and Management 2009: 258-264 - Jaroslav Kadlec, Radek Kuchta, Radimir Vrba:
Comparison of the WLAN's security functions time consumption. ICECS 2009: 920-923 - P. Muthu Kannan, Swaminathan Ramamurthy, V. Palanisamy:
Enhancing WLAN security with sectored antennas. ICUMT 2009: 1-5 - Samad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand:
The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. ICIS 2009: 873-876 - Hyeran Mun, Kyusuk Han, Kwangjo Kim:
3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. WTS 2009: 1-8 - 2008
- Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar, K. Vaithiyanathan:
Modified WEP key management for enhancing WLAN security. Int. J. Inf. Commun. Technol. 1(3/4): 437-452 (2008) - Mohammad S. Obaidat, Tarik Guelzim:
A New Security Access Scheme for WLANs and Its Performance Simulation Analysis. Simul. 84(6): 311-321 (2008) - Shih-Feng Hsu, Yi-Bing Lin:
Selecting transition process for WLAN security. Wirel. Commun. Mob. Comput. 8(7): 921-925 (2008) - Yixin Jiang, Chuang Lin, Hao Yin, Zhen Chen:
A mutual authentication and privacy mechanism for WLAN security. Wirel. Commun. Mob. Comput. 8(1): 101-112 (2008) - Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar:
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. COMSWARE 2008: 409-414 - Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia:
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. ICDCS 2008: 28-35 - Zhiwen Wang, Meizhen Liu, Qixian Cai, Jie Li:
Improving Project for security and secrecy's risk of WLAN management. ISKE 2008: 1460-1465 - Christian Kraetzer, Jana Dittmann, Ronny Merkel:
WLAN steganography revisited. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681903 - Stefanos Gritzalis, Costas Lambrinoudakis:
IEEE 802.11 Wireless LANs (WLANs): Security. Encyclopedia of Wireless and Mobile Communications 2008 - S. P. T. Krishnan, Bharadwaj Veeravalli, Lawrence W. C. Wong:
Wireless LANs (WLANs): Security and Privacy. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas:
Analysis of the effect of security on data and voice traffic in WLAN. Comput. Commun. 30(11-12): 2468-2477 (2007) - Biju Issac, Lawan A. Mohammed:
War Driving and WLAN Security Issues - Attacks, Security Design and Remedies. Inf. Syst. Manag. 24(4): 289-298 (2007) - Ezedin Barka, Mohammed Boulmalf:
On the Impact of Security on the Performance of WLANs. J. Commun. 2(4): 10-17 (2007) - Muhammad Sher, Thomas Magedanz:
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. ARES 2007: 198-205 - Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. NPC 2007: 306-314 - Bill Lipiczky:
Voice over WLAN. Information Security Management Handbook, 6th ed. 2007: 1997-2006 - Franjo Majstor:
WLAN Security Update. Information Security Management Handbook, 6th ed. 2007: 1761-1776 - Qiang Tang:
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan. IACR Cryptol. ePrint Arch. 2007: 122 (2007) - 2006
- Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang:
3G and WLAN Interworking Security: Current Status and Key. Int. J. Netw. Secur. 2(1): 1-13 (2006) - Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan, Edilbert Kamal Dass:
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs. Int. J. Wirel. Mob. Comput. 1(3/4): 276-288 (2006) - Phongsak Keeratiwintakorn, Prashant Krishnamurthy:
An energy efficient security protocol for IEEE 802.11 WLANs. Pervasive Mob. Comput. 2(2): 204-231 (2006) - Neil Smyth, Máire McLoone, John V. McCanny:
WLAN security processor. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(7): 1506-1520 (2006) - Chih-Mou Shih, Shang-Juh Kao:
Security Gateway for Accessing IPv6 WLAN. ACIS-ICIS 2006: 83-88