THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 50 |
Dung lượng | 0,92 MB |
Nội dung
Ngày đăng: 14/02/2014, 08:20
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||||
---|---|---|---|---|---|---|
Matsunaga, Yasuhiko et al., “Secure Authentication System for Public WLAN Roaming,” Proceedings of the First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003 | Sách, tạp chí |
|
||||
Mitsuyama, Yukio et al., “Embedded Architecture of IEEE 802.11i Cipher Algorithms,” Proceedings of the IEEE International Symposium on Consumer Electronics, 2004.O’Hara, Bob and Petrick, Al, IEEE 802.11 Handbook: A Designer’s Companion, IEEE Press, 2001 | Sách, tạp chí |
|
||||
Schmoyer, Tim, Lim, Yu-Xi, and Owen, Henry, “Wireless Intrusion Detection and Response: A Case Study Using the Classic Man-in-the-Middle Attack,” Proceedings of IEEE Wireless Communication and Networking Conference 2004, 2004 | Sách, tạp chí |
|
||||
Smyth, Neil, McLoone, Máire, and McCanny, John, “Reconfigurable Hardware Acceleration of WLAN Security,” IEEE Workshop on Signal Processing Systems (SiPS) Design & Implementation, 2004.Šorman, Matija, Kovač, Tomislav, and Maurović, Damir, “Implementing Improved WLAN Security,”46th International Symposium Electronics in Marine, 2004 | Sách, tạp chí |
|
||||
Wool, Avishai, “A Note on the Fragility of the ‘Michael’ Message Integrity Code,” IEEE Transactions on Wireless Communications, Vol. 3 No. 5, September 2004.You, Liyu and Jamshaid, Kamran, “Novel Applications for 802.11x Enabled Wireless Networked Home,”2004 IEEE Consumer Communications and Networking Conference, 2004 | Sách, tạp chí |
|
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN