Wireless security

Known as: Wireless LAN Security, Wireless Internet Security, WLAN security 
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2018
020406019872018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and… (More)
  • table 1
  • figure 2
  • figure 3
  • table 2
  • table 3
Is this relevant?
Review
2016
Review
2016
Wireless information and power transfer (WIPT) enables more sustainable and resilient communications due to the fact that it… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
In this paper, we study how to improve wireless security for bidirectional communications. For the scenario with single-antenna… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The process of identifying radio transmitters by examining their unique transient characteristics at the beginning of… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Protecting the network layer in a mobile ad hoc network is an important research topic in wireless security. This paper describes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?