Five steps to securing wireless

被引:0
|
作者
Broderick, JS
机构
来源
COMMUNICATIONS NEWS | 2003年 / 40卷 / 11期
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:37 / 37
页数:1
相关论文
共 50 条
  • [1] Securing a wireless world
    Yang, H
    Ricciato, F
    Lu, SW
    Zhang, LX
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 442 - 454
  • [2] Securing wireless networks
    Silverman, M
    [J]. DR DOBBS JOURNAL, 2003, 28 (06): : 36 - +
  • [3] Securing Wireless Neurostimulators
    Marin, Eduard
    Singelee, Dave
    Yang, Bohan
    Volski, Vladimir
    Vandenbosch, Guy A. E.
    Nuttin, Bart
    Preneell, Bart
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 287 - 298
  • [4] Securing the wireless Internet
    Gupta, V
    Gupta, S
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (12) : 68 - 74
  • [5] Securing wireless networks
    Lamison-White, Eric
    Lamison-White, Eric
    [J]. WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 10, 2005, : 341 - 345
  • [6] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [7] Securing Wireless Medical Devices
    Kaadan, Asaad
    Refai, Hazem H.
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 942 - 948
  • [8] Securing Wireless Infusion Pumps
    Arbelaez, Andrea
    Edwards, Sallie
    Littlefield, Kevin
    Wang, Sue
    Zheng, Kangmin
    [J]. 2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 141 - 141
  • [9] Securing wireless mesh networks
    Glass, Steve
    Portmann, Marius
    Muthukkumarasamy, Vallipuram
    [J]. IEEE INTERNET COMPUTING, 2008, 12 (04) : 30 - 36
  • [10] Five steps to excellence
    Berry, JN
    [J]. LIBRARY JOURNAL, 2005, 130 (11) : 32 - 35