Author:
Armenteros Álvaro,García Laura,Muñoz Antonio,Maña Antonio
Reference10 articles.
1. Weiser M, Demers A, and Hauser C (1989) The Portable Common Runtime Approach to Interoperability. ACM Symposium on Operating Systems Principles.
2. Aboba B, Calhoun P (2003) RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP). IETF RFC 3579 (Updates: RFC 2869).
3. Chiba M, Dommety G, Eklund M, Mitton D, Aboba B (2008) Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS). IETF RFC 5176 (Obsoletes: RFC 3576).
4. IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements IEEE Standards (2004-07-23)
5. Bulbul HI, Batmaz I, Ozel M. (2008) Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. Proc 1st International Conference on Forensic applications (e-Forensics), Adelaide, Australia.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The SERENITY Runtime Monitoring Framework;Security and Dependability for Ambient Intelligence;2009