Wireless security

Results: 2930



#Item
1Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

Add to Reading List

Source URL: ribf.riken.go.jp

- Date: 2012-12-01 22:57:34
    2492  IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Channel-Based Detection of Sybil Attacks in Wireless Networks

    492 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Channel-Based Detection of Sybil Attacks in Wireless Networks

    Add to Reading List

    Source URL: www.winlab.rutgers.edu

    Language: English - Date: 2010-10-13 17:15:15
      3CERTICOM APPLICATION NOTES  Certicom Security for Sensor Networks Ensuring security Security in in wireless

      CERTICOM APPLICATION NOTES Certicom Security for Sensor Networks Ensuring security Security in in wireless

      Add to Reading List

      Source URL: www.certicom.com

      Language: English - Date: 2016-12-13 17:25:30
        4Applications and Security of Next-Generation, User-Centric Wireless Systems

        Applications and Security of Next-Generation, User-Centric Wireless Systems

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2010-07-29 09:07:37
          5A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

          A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

          Add to Reading List

          Source URL: disco.cs.uni-kl.de

          Language: English - Date: 2018-03-05 21:39:26
            6A Disruption-Resistant MAC Layer for Multichannel Wireless Networks Henry Tan, Chris Wacek, Calvin Newport, and Micah Sherr Georgetown University Washington, DC, USA {ztan,cwacek,cnewport,msherr}@cs.georgetown.edu

            A Disruption-Resistant MAC Layer for Multichannel Wireless Networks Henry Tan, Chris Wacek, Calvin Newport, and Micah Sherr Georgetown University Washington, DC, USA {ztan,cwacek,cnewport,msherr}@cs.georgetown.edu

            Add to Reading List

            Source URL: security.cs.georgetown.edu

            Language: English - Date: 2015-01-20 15:52:17
              7ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

              ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

              Add to Reading List

              Source URL: ccl.northwestern.edu

              Language: English - Date: 2018-05-15 12:56:11
                89. SECURITY FOR WIRELESS NETWORKS 1. Introduction

                9. SECURITY FOR WIRELESS NETWORKS 1. Introduction

                Add to Reading List

                Source URL: wndw.net

                - Date: 2013-04-17 14:13:01
                  9Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networked Systems Security Group KTH Royal Institute of Technology, Stockholm, Sweden {moritzw, papad

                  Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networked Systems Security Group KTH Royal Institute of Technology, Stockholm, Sweden {moritzw, papad

                  Add to Reading List

                  Source URL: www.kth.se

                  - Date: 2015-10-04 09:22:45
                    10Wireless security with 802.1x and PEAP Steve Riley Senior Consultant, MCS Trustworthy Computing Services 13 JanuaryWireless LAN authentication

                    Wireless security with 802.1x and PEAP Steve Riley Senior Consultant, MCS Trustworthy Computing Services 13 JanuaryWireless LAN authentication

                    Add to Reading List

                    Source URL: blackhat.com

                    - Date: 2015-05-28 15:51:53