Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference35 articles.
1. Sheldon, F. T., Weber, J. M., Yoo, S.-M., & David Pan, W. (2012). The insecurity of wireless networks. IEEE Security and Privacy, 10(4), 54–61. doi:
10.1109/MSP.2012.60
.
2. Potter, B. (2003). Wireless security’s future. IEEE Security and Privacy, 1(4), 68–72. doi:
10.1109/MSECP.2003.1219074
.
3. Housley, R., & Arbaugh, W. (2003). Security problems in 802.11 based networks. Communications of the ACM, 46(5), 31–34. doi:
10.1145/769800.769822
.
4. Lashkari, A. H., Danesh, M. M. S., & Samadi, B. (2009). A survey on wireless security protocols (WEP, WPA & WPA2/802.11 i). In Computer science and information technology 2nd IEEE international conference, pp. 48–52. doi:
10.1109/ICCSIT.2009.5234856
.
5. Mathews, M., & Hunt, R. (2007). Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2). In Proceedings of the fourth IASTED Asian conference on communication systems and networks, pp. 292–297.
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献