Sciweavers

10044 search results - page 54 / 2009
» Authentication in Wireless Networks
Sort
View
136
Voted
ACSAC
2006
IEEE
15 years 7 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
122
Voted
ACMSE
2006
ACM
15 years 9 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
229
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Routing in outer space: fair traffic load in multi-hop wireless networks
Alessandro Mei, Julinda Stefa