Lei et al., 2007 - Google Patents
Comparative studies on authentication and key exchange methods for 802.11 wireless LANLei et al., 2007
View PDF- Document ID
- 7573122665032527535
- Author
- Lei J
- Fu X
- Hogrefe D
- Tan J
- Publication year
- Publication venue
- computers & security
External Links
Snippet
IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further …
- 230000000052 comparative effect 0 title description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sankar | Cisco wireless LAN security | |
Dantu et al. | EAP methods for wireless networks | |
Leroy et al. | SWISH: secure WiFi sharing | |
Ali et al. | A comparative study of authentication methods for wi-fi networks | |
Arana | Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2) | |
Tseng | USIM-based EAP-TLS authentication protocol for wireless local area networks | |
Choi et al. | Secure MAC-layer protocol for captive portals in wireless hotspots | |
Lei et al. | Comparative studies on authentication and key exchange methods for 802.11 wireless LAN | |
Pandey et al. | A system and method for authentication in wireless local area networks (wlans) | |
Yang et al. | Link-layer protection in 802.11 i WLANS with dummy authentication | |
Han | A threat analysis of the extensible authentication protocol | |
Prasad et al. | A secure certificate based authentication to reduce overhead for heterogeneous wireless network | |
Chu et al. | Secure data transmission with cloud computing in heterogeneous wireless networks | |
Sorman et al. | Implementing improved WLAN security | |
Srinivasan et al. | VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins | |
Tsai et al. | Roaming across wireless local area networks using SIM-based authentication protocol | |
Pervaiz et al. | Security in wireless local area networks | |
Badra et al. | Flexible and fast security solution for wireless LAN | |
Nguyen | Wireless Network Security: A Guide for Small and Medium Premises | |
Wan et al. | Access control protocols with two-layer architecture for wireless networks | |
Jiang et al. | Network Security in RWNs | |
Huang et al. | WLAN authentication system based on the improved EAP-TLS protocol | |
Munasinghe | VPN over a wireless infrastructure: evaluation and performance analysis | |
Frankel et al. | Guide to ieee 802.11 i: Establishing robust security networks | |
Raman | Security in wireless networks |