Sciweavers

1482 search results - page 59 / 297
» Wireless LAN Security
Sort
View
MOBIHOC
2001
ACM
14 years 9 months ago
Secure pebblenets
Stefano Basagni, Kris Herrin, Danilo Bruschi, Emil...
EWSN
2007
Springer
14 years 9 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
JCM
2007
191views more  JCM 2007»
13 years 9 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
COMSIS
2006
100views more  COMSIS 2006»
13 years 10 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
COMCOM
2000
79views more  COMCOM 2000»
13 years 9 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee