Sciweavers

1482 search results - page 10 / 297
» Wireless LAN Security
Sort
View
SPW
2004
Springer
14 years 23 days ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
AINA
2004
IEEE
13 years 11 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou
DATE
2005
IEEE
146views Hardware» more  DATE 2005»
14 years 1 months ago
Wireless LAN: Past, Present, and Future
This paper retraces the historical development of wireless LAN technology in the context of the pursuit of ever higher data rate, describes the significant technical breakthroughs...
Keith Holt
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen