Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
Wireless security
Known as:
Wireless LAN Security
, Wireless Internet Security
, WLAN security
Expand
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AirSnort
Authentication
Barcode reader
Bluetooth
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Approaches to Solve Big Data Security Issues and Comparative Study of Cryptographic Algorithms for Data Encryption
Vinit Gopal Savant
2015
Corpus ID: 61531202
In this paper main big-data security issues are discussed. The challenges of security in big data environment can be categorized…
Expand
2011
2011
WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform
Matthias Wilhelm
,
I. Martinovic
,
J. Schmitt
,
Vincent Lenders
MOCO
2011
Corpus ID: 729344
We present RFReact, a USRP2-based platform that enables selective and reactive RF jamming. We demonstrate that RFReact is both…
Expand
2008
2008
An In-Field-Maintenance Framework for Wireless Sensor Networks
Q. Cao
,
J. Stankovic
International Conference on Distributed Computing…
2008
Corpus ID: 2579158
This paper introduces a framework for in-field-maintenance services for wireless sensor networks. The motivation of this work is…
Expand
2007
2007
On the Impact of Security on the Performance of WLANs
E. Barka
,
M. Boulmalf
Journal of Communications
2007
Corpus ID: 18389401
This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different…
Expand
Review
2006
Review
2006
IEEE 802.11 Wireless LAN Security Overview
A. A. Naamany
,
Ali Al Shidhani
,
H. Bourdoucen
2006
Corpus ID: 15803299
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers…
Expand
2005
2005
BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Praphul Chandra
2005
Corpus ID: 59808248
CH 1: Security and Cryptography CH 2: Network Security Protocols CH 3: Security and the Layered Architecture CH 4: Voice-Oriented…
Expand
Highly Cited
2004
Highly Cited
2004
IEEE 802.11 wireless LAN security performance using multiple clients
N. Baghaei
,
R. Hunt
ICON
2004
Corpus ID: 14642684
IEEE 802.11 wireless networks have gained increasing popularity in recent times, providing users with both mobility and…
Expand
2003
2003
Demonstrating vulnerabilities in Bluetooth security
Creighton T. R. Hager
,
S. Midkiff
GLOBECOM '03. IEEE Global Telecommunications…
2003
Corpus ID: 26528022
The Bluetooth radio system has been developed to provide mobile ad-hoc connectivity between a wide range of portable and fixed…
Expand
Review
2002
Review
2002
Maximum Wireless Security
C. Peikari
,
Seth Fogie
2002
Corpus ID: 107112389
From the Publisher: Wireless Maximum Security is the quickest way to learn how to "war drive" your own wireless networks to test…
Expand
Review
2001
Review
2001
SAFE: Wireless LAN Security in Depth
Sheila Convery
,
David R. Miller
2001
Corpus ID: 59810799
This paper provides best-practice information to interested parties for designing and implementing wireless LAN (WLAN) security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE