Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,266,013 papers from all fields of science
Search
Sign In
Create Free Account
MAC filtering
Known as:
MAC address filtering
, MAC blocking
In computer networking, MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Blacklist (computing)
Cracking of wireless networks
MAC address
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Lagrange Interpolation for Mobile Agent Connection Encryption
Ibn al-Haitham
,
H. K. Homood
2017
Corpus ID: 150241903
A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the…
Expand
2016
2016
A Study of Distinctive tools to hack wireless network
G. Singh
2016
Corpus ID: 63970361
Wireless security is the prevention of illegal access or destruction to computer systems that are using wireless networks. The…
Expand
2016
2016
ANALISIS WIRELESS LOCAL AREA NETWORK (WLAN) DAN PERANCANGAN MAC ADDRESS FILTERING MENGGUNAKAN MIKROTIK (STUDI KASUS PADA PT.GRAHA PRIMA SWARA JAKARTA)
Kurani Mega Asteroid
,
Yayan Hendrian
2016
Corpus ID: 58420506
ABSTRACT PT. Graha Prima Swara has applied technology of WLAN in its company because of its superiority in probabilities and…
Expand
2016
2016
MEMBANGUN JARINGAN MENGGUNAKAN ACCESS POINT WIRELESS TL-WA7210N DAN ANTENA GRID 2.4GHz DENGAN KEAMANAN JARINGAN WPA2-PSK DAN MAC FILTERING PADA WILAYAH RTM
Bobby Kamiswara
2016
Corpus ID: 114177255
Ada beberapa kasus yang sering terjadi oleh beberapa jaringan komputer administrator saat ini. Sulitnya mendapatkan koneksi…
Expand
2012
2012
Conciliating remote home network access and MAC-address control
Stéphane Onno
,
C. Neumann
,
Olivier Heen
IEEE International Conference on Consumer…
2012
Corpus ID: 26533018
Users are increasingly nomadic and want to access their home network from anywhere. Such remote access might also be granted for…
Expand
2011
2011
A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless
A. L
,
Vani B
2011
Corpus ID: 2699284
Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for…
Expand
2011
2011
A flexible design of network devices using reconfigurable content addressable memory
Q. Ali
˜The œinternational Arab journal of information…
2011
Corpus ID: 20299
The content addressable memory is a memory unit that uses content matching instead of addresses. content addressable memory are…
Expand
2011
2011
Measurement And Comparison Between Wireless Network Security (MAC, Address Filtering, EAP-TTLS, PEAP-MSCHAPv2 (IPsec) )
M. Yusof
,
A. Bakar
2011
Corpus ID: 108876961
Wireless network refers to all types of computer networks that are not ted by any type of cable. The IEEE specifies the 802.11…
Expand
2008
2008
Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement
J. Rhee
,
Jinsung Im
,
J. Ryoo
2008
Corpus ID: 62580562
Ethernet ring protection is a new technology introduced in ITU‐T Recommendation G.8032, which utilizes the generic Ethernet MAC…
Expand
1992
1992
Filtering system for mac address
Masahiko Kokado
,
Hiroyuki Nakano
,
+5 authors
筒井 英一
1992
Corpus ID: 196144036
PURPOSE: To suppress the increase of registers in a filtering circuit for the respective nodes of a transmission line and the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE