Sciweavers

1482 search results - page 68 / 297
» Wireless LAN Security
Sort
View
ACISP
2005
Springer
14 years 3 months ago
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the ...
Phillip Pudney, Jill Slay
SASN
2003
ACM
14 years 3 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
INFOCOM
2007
IEEE
14 years 4 months ago
Who Said That? Privacy at Link Layer
Abstract— Wireless LAN and other radio broadcast technologies are now in full swing. However, the widespread usage of these technologies comes at the price of location privacy, b...
Frederik Armknecht, Joao Girão, Alfredo Mat...
BROADNETS
2005
IEEE
14 years 3 months ago
Performance analysis of the ieee 802.11e block ACK scheme in a noisy channel
— A Block ACK (BTA) scheme has been proposed in IEEE 802.11e to improve medium access control (MAC) layer performance. It is also a promising technique for next-generation high-s...
Tianji Li, Qiang Ni, Thierry Turletti, Yang Xiao
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 10 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp