Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,079,222 papers from all fields of science
Search
Sign In
Create Free Account
Wireless security
Known as:
Wireless LAN Security
, Wireless Internet Security
, WLAN security
Expand
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AirSnort
Authentication
Barcode reader
Bluetooth
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Neural-Like Means for Data Streams Encryption and Decryption in Real Time
I. Tsmots
,
Yurii Tsymbal
,
Viktor Khavalko
,
O. Skorokhoda
,
T. Teslyuk
International Conference on Data Stream Mining…
2018
Corpus ID: 52925829
The “model of successive geometric transformations” paradigm has been adapted for the implementation of parallel-streaming neural…
Expand
2018
2018
Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach
T. Kumar
,
Shikhabaghel Chauhan
2018
Corpus ID: 67812011
With the increase in use of digital technology, use of data items in the format of text, image and videos are also increases. To…
Expand
2011
2011
WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform
Matthias Wilhelm
,
I. Martinovic
,
J. Schmitt
,
Vincent Lenders
MOCO
2011
Corpus ID: 729344
We present RFReact, a USRP2-based platform that enables selective and reactive RF jamming. We demonstrate that RFReact is both…
Expand
2010
2010
A predictive judgment method for WLAN attacking based on cloud computing environment
Ran Liu
,
Jianping Li
International Conference on Apperceiving…
2010
Corpus ID: 14442048
In this paper, we analysed the status of WLAN security. According to the weakness of the most common encryption protocols WEP and…
Expand
2006
2006
Elastic block ciphers
A. Keromytis
,
Debra L. Cook
2006
Corpus ID: 264407973
Standard block ciphers are designed around one or a small number of block sizes. From both a practical and a theoretical…
Expand
2005
2005
BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Praphul Chandra
2005
Corpus ID: 59808248
CH 1: Security and Cryptography CH 2: Network Security Protocols CH 3: Security and the Layered Architecture CH 4: Voice-Oriented…
Expand
2003
2003
Demonstrating vulnerabilities in Bluetooth security
Creighton T. R. Hager
,
S. Midkiff
GLOBECOM '03. IEEE Global Telecommunications…
2003
Corpus ID: 26528022
The Bluetooth radio system has been developed to provide mobile ad-hoc connectivity between a wide range of portable and fixed…
Expand
Review
2003
Review
2003
A Survey of 802.11a Wireless Security Threats and Security Mechanisms
Scott D. Lathrop
2003
Corpus ID: 9633874
Executive Summary High bandwidth wireless local area networks are gaining popularity. Along with this popularity has come a well…
Expand
Review
2001
Review
2001
SAFE: Wireless LAN Security in Depth
Sheila Convery
,
David R. Miller
2001
Corpus ID: 59810799
This paper provides best-practice information to interested parties for designing and implementing wireless LAN (WLAN) security…
Expand
Review
1999
Review
1999
Cryptographic security Techniques for wireless networks
D. Patiyoot
,
S. Shepherd
OPSR
1999
Corpus ID: 3061448
This paper deals with security techniques for wireless Networks. The work presented is based on a review of literature regarding…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE