Abstract | ||
---|---|---|
Despite significant shortcomings in the initial security architecture, 802.11 wireless LANs have experienced explosive growth in recent years. Ongoing work in IEEE standards bodies is currently attempting to fix these shortcomings. One specific topic that has received extensive attention is how to enable these networks to authenticate users and to dynamically establish per-user per-session cryptog... |
Year | DOI | Venue |
---|---|---|
2002 | 10.1002/bltj.10004 | Bell Labs Technical Journal |
Keywords | Field | DocType |
wireless network,key exchange | Wireless network,Authentication,Computer security,Computer network,Authentication protocol,Internetworking,Extensible Authentication Protocol,Access control,Engineering,Diameter protocol,Protected Extensible Authentication Protocol | Journal |
Volume | Issue | ISSN |
7 | 2 | 1089-7089 |
Citations | PageRank | References |
4 | 0.86 | 4 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Uri Blumenthal | 1 | 38 | 4.83 |
Milind M. Buddhikot | 2 | 734 | 90.03 |
Juan A. Garay | 3 | 2785 | 222.49 |
Scott Miller | 4 | 202 | 37.09 |
Sarvar Patel | 5 | 732 | 45.86 |
Luca Salgarelli | 6 | 937 | 81.17 |
Dorothy Stanley | 7 | 4 | 0.86 |