Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Wireless security

Known as: Wireless LAN Security, Wireless Internet Security, WLAN security 
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Conventional wireless security assumes wireless communications are legitimate, and aims to protect them against malicious… Expand
  • figure 3
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Gaussian minimum shift keying (GMSK) is employed in current global system for mobile (GSM) networks and remains a viable option… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Home security system is needed for occupants' convenience and safety. In this paper, we present the design and implementation of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The process of identifying radio transmitters by examining their unique transient characteristics at the beginning of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… Expand
  • figure 1
  • figure 2
Is this relevant?