Wireless network security

被引:0
|
作者
Xiao, Yang
Lin, Yi-Bing
Du, Ding-Zhu
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 300, Taiwan
[3] Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
D O I
10.1155/WCN/2006/48374
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Wireless Network Security: Tough Times
    Wadhwa, Utkarsh
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1022 - 1025
  • [22] Security mechanisms for Wireless Home Network
    Zhuge, J
    Yao, R
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1527 - 1531
  • [23] Security architectures in wireless sensor network
    Bhasin V.
    Kumar S.
    Saxena P.C.
    Katti C.P.
    International Journal of Information Technology, 2020, 12 (1) : 261 - 272
  • [24] SECURITY ISSUES IN A CDPD WIRELESS NETWORK
    FRANKEL, Y
    HERZBERG, A
    KARGER, PA
    KRAWCZYK, H
    KUNZINGER, CA
    YUNG, MT
    IEEE PERSONAL COMMUNICATIONS, 1995, 2 (04): : 16 - 27
  • [25] Defense and security of a wireless tactical network
    Younger, M
    Young, S
    DIGITAL WIRELESS COMMUNICATION III, 2001, 4395 : 224 - 232
  • [26] Research on Wireless Network Security Model
    Linmao
    Wangyong
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 785 - 790
  • [27] Designing of Security Hardware for Wireless Network
    Ozalp, Murat
    Karakuzu, Cihan
    Zengin, Ahmet
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 244 - 247
  • [28] Network Security Through Wireless Location
    Peres, Andre
    Weber, Raul Fernando
    2009 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2009, : 33 - +
  • [29] Wireless Network Security: Building on Erasures
    Fragouli, Christina
    Prabhakaran, Vinod M.
    Czap, Laszlo
    Diggavi, Suhas N.
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1826 - 1840
  • [30] Building security into your wireless network
    Young, M
    INTECH, 2002, 49 (09) : 66 - 66