Sciweavers

22 search results - page 1 / 5
» Guarded Authentic Local Area Network GALAN
Sort
View
VIS
1995
IEEE
77views Visualization» more  VIS 1995»
13 years 8 months ago
Guarded Authentic Local Area Network GALAN
Dirk Fox, T. Henn, K. Reichel, Christoph Ruland
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 5 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
BROADNETS
2005
IEEE
13 years 11 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
SCN
2008
Springer
131views Communications» more  SCN 2008»
13 years 5 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...