Karygiannis et al., 2002 - Google Patents
Wireless Network Security:.Karygiannis et al., 2002
View PDF- Document ID
- 11155535194292294031
- Author
- Karygiannis T
- Owens L
- Publication year
External Links
Snippet
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs …
- 238000005516 engineering process 0 abstract description 83
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Sobh | Wi-Fi networks security and accessing control | |
Chen et al. | Wireless network security | |
Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
Scarfone et al. | Guide to securing WiMAX wireless communications | |
Chen et al. | Security in wireless local area networks | |
Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
Lounis | Security of short-range wireless technologies and an authentication protocol for IoT | |
Firdus et al. | WiFi from past to today, consequences that can cause and measures of prevention from them, WiFi security protocols | |
Shree et al. | Security challenges in mobile communication networks | |
Helling | Home network security | |
Osterhage | Wireless security | |
Faraj | Security technologies for wireless access to local area networks | |
Scarfone et al. | Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks | |
Indumathi et al. | Bluetooth: State of the Art, Taxonomy, and Open Issues for Managing Security Services in Heterogeneous Networks | |
Chakraborty et al. | An Extensive Review of Wireless Local Area Network Security Standards | |
Padgette et al. | Guide to Bluetooth Security (Draft) | |
Gambiraopet | Security threats and intrusion detection models in WLAN | |
Ayat et al. | Wireless Security | |
Liang et al. | The practical risk assessment for enterprise Wireless Local Area Network | |
Kumar et al. | Contemporary Exploration of Wireless Network Security issues & Design Challenges for an Enterprise Network | |
Gandhi | A Study on Wireless LAN Fundamentals, Architecture, Benefits and Its Security Risks | |
Scarfone | Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology | |
Ma et al. | Security Access in Wireless Local Area Networks | |
Jaiaree | The security aspects of wireless local area network (WLAN) |