[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lei et al., 2007 - Google Patents

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN

Lei et al., 2007

View PDF
Document ID
7573122665032527535
Author
Lei J
Fu X
Hogrefe D
Tan J
Publication year
Publication venue
computers & security

External Links

Snippet

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further …
Continue reading at user.informatik.uni-goettingen.de (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sankar Cisco wireless LAN security
Dantu et al. EAP methods for wireless networks
Leroy et al. SWISH: secure WiFi sharing
Ali et al. A comparative study of authentication methods for wi-fi networks
Arana Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)
Tseng USIM-based EAP-TLS authentication protocol for wireless local area networks
Choi et al. Secure MAC-layer protocol for captive portals in wireless hotspots
Lei et al. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN
Pandey et al. A system and method for authentication in wireless local area networks (wlans)
Yang et al. Link-layer protection in 802.11 i WLANS with dummy authentication
Han A threat analysis of the extensible authentication protocol
Prasad et al. A secure certificate based authentication to reduce overhead for heterogeneous wireless network
Chu et al. Secure data transmission with cloud computing in heterogeneous wireless networks
Sorman et al. Implementing improved WLAN security
Srinivasan et al. VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins
Tsai et al. Roaming across wireless local area networks using SIM-based authentication protocol
Pervaiz et al. Security in wireless local area networks
Badra et al. Flexible and fast security solution for wireless LAN
Nguyen Wireless Network Security: A Guide for Small and Medium Premises
Wan et al. Access control protocols with two-layer architecture for wireless networks
Jiang et al. Network Security in RWNs
Huang et al. WLAN authentication system based on the improved EAP-TLS protocol
Munasinghe VPN over a wireless infrastructure: evaluation and performance analysis
Frankel et al. Guide to ieee 802.11 i: Establishing robust security networks
Raman Security in wireless networks