Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
  • References (2)
  • Cited By (175)
References2
Published on Jan 1, 2012
Pierre L'Ecuyer48
Estimated H-index: 48
(Université de Montréal)
The fields of probability and statistics are built over the abstract concepts of probability space and random variable. This has given rise to elegant and powerful mathematical theory, but exact implementation of these concepts on conventional computers seems impossible. In practice, random variables and other random objects are simulated by deterministic algorithms. The purpose of these algorithms is to produce sequences of numbers or objects whose behavior is very hard to distinguish from that...
271 Citations Source Cite
Published on Jan 1, 1996
Alfred Menezes44
Estimated H-index: 44
,
Scott A. Vanstone17
Estimated H-index: 17
(University of Waterloo),
Paul C. van Oorschot34
Estimated H-index: 34
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.
10.5k Citations
Cited By175
Published on May 1, 2002in Sys Admin archive
Published on Jan 1, 2003
Srivaths Ravi27
Estimated H-index: 27
(Princeton University),
Anand Raghunathan53
Estimated H-index: 53
(Princeton University)
+ 1 AuthorsSunil V. Hattangady22
Estimated H-index: 22
(Texas Instruments)
Realizing the visions of ubiquitous computing and communications, and ambient intelligence will require modern electronic and computing systems to pervade all aspects of our everyday lives. These systems are used to capture, manipulate, store and communicate a wide range of sensitive and personal information. It is, therefore, not surprising that security is emerging as a critical concern that must be addressed in order to enable these trends. Mobile appliances, which will play a critical role i...
Source Cite
Published on Jan 1, 2007
In this paper, we focus on one of the most critical security issues - authentication. Authentication within wireless networks is reviewed. Wi-Fi security weaknesses are illustrated. These drawbacks involve the necessity of designing a new generation of secure wireless systems. In fact, self-control, flexibility, adaptability, autonomy and distribution are the main features to be addressed in a suitable architecture that fulfills modern requirements. In this context, we propose an incremental app...
Published on Jan 1, 2006
Keijo Haataja1
Estimated H-index: 1
2 Citations
Published on Jan 1, 2006
Filip Perich16
Estimated H-index: 16
(University of Maryland, College Park),
Anupam Joshi67
Estimated H-index: 67
(University of Maryland, College Park),
Rada Chirkova14
Estimated H-index: 14
(North Carolina State University)
The overall goal of data management and processing in mobile ad-hoc networks is to allow individual devices to compute what information each device needs, when the device needs it, and how it can obtain the information. This chapter identifies the fundamental challenges and outlines ongoing and needed future work in order to achieve this goal.
10 Citations Source Cite
Published on Jul 15, 2011
Dinesh Yadav (Indian Institute of Technology Roorkee), Anjali Sardana10
Estimated H-index: 10
(Indian Institute of Technology Roorkee)
Authentication is a challenging area in wireless networks. The authentication process of IEEE 802.11i is using the standards of IEEE 802.1X for authentication; and for key management and distribution 4-way handshake protocol is used. In this paper, we exhaustively review the authentication technique in IEEE 802.11i. The work presents a security analysis of authentication technique which shows its strengths against various threats and some flaws which are responsible for security breaches. The pa...
Source Cite
Published on Jan 1, 2006
Published on Jan 1, 2002
Enterprises are extending their wired LAN infrastructure to support wireless connectivity, using radio standards such as IEEE 802.11b, Bluetooth, HiperLAN, and other emerging technologies. Wireless LANs give mobile users "anywhere, anytime" access to the LAN, and wireless connectivity offers lower installation and maintenance costs compared with traditional wired network infrastructure. However, to play a mission-critical role within the enterprise, wireless LANs must satisfy the security, manag...
Published on Nov 1, 2008
Stuart Cunningham5
Estimated H-index: 5
,
Vic Grout10
Estimated H-index: 10
Wireless networking technologies, under the umbrella of the IEEE 802.11 suite of standards and commonly referred to as Wi-Fi, is now commonplace technology in both the home and office. In this work, we present the results of studies into wireless networking uptake and security within two town communities in the UK. Our work concentrates on the geographical positioning of wireless access points (APs) and the security measures used to protect these liberating technologies from unwanted misuse, oft...
View next paperIntercepting mobile communications: the insecurity of 802.11