Sciweavers

1101 search results - page 2 / 221
» On the Security and Vulnerability of PING
Sort
View
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 5 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 9 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...