Letteratura scientifica selezionata sul tema "WLAN"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "WLAN".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "WLAN"
Durresi, Arjan, Mimoza Durresi e Leonard Barolli. "Secure Authentication in Heterogeneous Wireless Networks". Mobile Information Systems 4, n. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.
Testo completoPolgár, Zsolt Alfréd, Andrei Ciprian Hosu, Zsuzsanna Ilona Kiss e Mihály Varga. "Vertical Handover Decision Algorithm for Heterogeneous Cellular-WLAN Networks". MACRo 2015 1, n. 1 (1 marzo 2015): 1–12. http://dx.doi.org/10.1515/macro-2015-0001.
Testo completoKhuder, Enaam F. "Performance Analysis of Industrial WLAN Based on EDCA Scheme Defined in IEEE802.11e". Tikrit Journal of Engineering Sciences 21, n. 1 (18 luglio 2013): 24–34. http://dx.doi.org/10.25130/tjes.21.1.04.
Testo completoEtta, Victor Ojong, Arif Sari, Agbotiname Lucky Imoize, Piyush Kumar Shukla e Musah Alhassan. "Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique". Mobile Information Systems 2022 (30 giugno 2022): 1–21. http://dx.doi.org/10.1155/2022/7936236.
Testo completoJardosh, Amit P., Konstantina Papagiannaki, Elizabeth M. Belding, Kevin C. Almeroth, Gianluca Iannaccone e Bapi Vinnakota. "Green WLANs: On-Demand WLAN Infrastructures". Mobile Networks and Applications 14, n. 6 (9 dicembre 2008): 798–814. http://dx.doi.org/10.1007/s11036-008-0123-8.
Testo completoZola, Enrica, e Francisco Barcelo-Arroyo. "Characterizing User Behavior in a European Academic WiFi Network". International Journal of Handheld Computing Research 4, n. 2 (aprile 2013): 55–68. http://dx.doi.org/10.4018/jhcr.2013040104.
Testo completoDebnath, Sumon Kumar, Prodip Kumar Sarker, Md Manowarul Islam e Ileas Pramanik. "Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication". International Journal on AdHoc Networking Systems 11, n. 1 (31 gennaio 2021): 1–13. http://dx.doi.org/10.5121/ijans.2021.11101.
Testo completoParashar, Vivek, Ramgopal Kashyap, Ali Rizwan, Dimitrios A. Karras, Gilder Cieza Altamirano, Ekta Dixit e Fardin Ahmadi. "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)". Wireless Communications and Mobile Computing 2022 (7 giugno 2022): 1–11. http://dx.doi.org/10.1155/2022/4464447.
Testo completoShin, Sungjin, Donghyuk Han, Hyoungjun Cho e Jong-Moon Chung. "Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO". Mobile Information Systems 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4868479.
Testo completoPark, Jaehyoung, Yonggang Kim, Gyungmin Kim e Hyuk Lim. "Majority Voting-Based MAC Protocol for Exploiting Link-Layer Diversity in Wireless Networks". Sensors 21, n. 8 (12 aprile 2021): 2706. http://dx.doi.org/10.3390/s21082706.
Testo completoTesi sul tema "WLAN"
Memon, Abdul Qudoos, Ali Hasan Raza e Sadia Iqbal Iqbal. "WLAN Security : WLAN Security". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Testo completoWLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.
This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.
We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.
In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.
Opponents: Ali Murtaza & Mansoor Ahmed
Nyman, Pontus, e Stefan Sand. "Industrial WLAN". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20340.
Testo completoWLAN in the form of IEEE 802.11 is not used to any wide extent in the industrial environment. We examine how the protocol can be used for data communication in such an environment with regard to noise immunity and computing power needs, in the form of an empirical investigation. These studies have been conducted in an industrial environment with the three most commonly used standards IEEE 802.11b/g/n. The purpose of this paper is to understand what it is in the environment that disturbs signals and if the newest standard IEEE 802.11n has something new to add to the table that could revolutionize the focus. Tests and studies have shown that 802.11b and 802.11n is the best in terms of signal strength with interference in the environment. 802.11n is superior in terms of high bit rate.
Nordqvist, Petter. "CAN-WLAN brygga". Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-58130.
Testo completoThis report covers the construction of a CAN-WLAN bridge from a basic schematic all the way to a consumer ready product. The bridge uses the microprocessor AT90CAN128 and the WLAN module WIZ610wi which handles the communication of CAN and WLAN. The bridge is designed to be mounted stationary on a machine/vehicle which communicates through CAN. With a Smartphone or laptop you can then read the information on the CAN bus or send a CAN package. Everything is done through the web browser on the mobile device. Power supply and enclosure has been designed by the Electrum Automation. The remaining blocks have been designed from the ground up and is covered by this report. The bridge is generally designed to be able to communicate all types of CAN-busses with tunable parameters considering baud rate, id-length, etc.
Yeo, Jihwang. "WLAN workload characterization". College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2825.
Testo completoThesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Strand, Erlend Barstad. "WISA vs. WLAN: Co-existence challenges : - A tool for WLAN performance testing". Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8789.
Testo completoWireless Interface for Sensors and Actuators (WISA) is ABB's proprietary wireless protocol for industrial automation on the factory floor. It operates in the 2.4GHz ISM band. Wireless Local Area Networks (WLANs), which typically occupy a fixed portion of the same 2.4GHz ISM band, are becoming more and more common on the factory floor. This raises a question of co-existence and how the performance of traffic over WLAN is affected when interfered by WISA. This report is a result of the development of a software tool and assembly of hardware that can aid the future testing of the effect WISA has on nearby WLANs. Together with the explanation of the usage of this software tool, this report will also investigate different arrangements of hardware components that are used to demonstrate and test the functionality of this new software tool. The software tool and the hardware components enable the measurement of important traffic metrics between two computers that communicate over a WLAN. The hardware components include a WISA Base Station (BS) that is configurable through the software tool and is used to cause interference on the WLAN.
Andersson, Pierre, e Arvid Norlander. "Indoor Positioning Using WLAN". Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-23461.
Testo completoDenna rapport evaluerar olika metoder för att bestämma positionen av en smartphone som använder sig av Android-plattformen. Metoden skall inte använda sig av någon speciell hårdvara eller infrastruktur samt kunna hantera förhållanden där GPS är otillgängligt eller opålitligt, som till exempel inomhus. Den beskriver också implementation av ett sådant system som använder sig av en deterministisk fingerprinting-metod som någorlunda väl kan hantera enheter av olika modeller, en metod som innebär att man mäter upp en mängd med referenspunkter, kallade fingerprints, och använder dessa för att placera användaren. Projektet utfördes på uppdrag av Sigma, ett svenskt mjukvarukonsultbolag.
Plaisner, Denis. "LTE-Advanced/WLAN testbed". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316419.
Testo completoFalade, Olumuyiwa, e Marcellus Botsio. "Mobile IP Handover for WLAN". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4903.
Testo completoThe past few years have seen great increases in the use of portable devices like laptops, palmtops, etc. This has also led to the dramatic increase demand on wireless local area networks (WLAN) due to the flexibility and ease of use that it offers. Mobile IP and handover are important issues to be considered as these devices move within and between different networks and still have to maintain connectivity. It is, therefore, imperative to ensure seamless mobile IP handover for these devices as they move about.
In this thesis we undertake a survey to describe the real processes involved in mobile IP handover in WLAN environment for different scenarios. Our work also identifies individual sources of delay during the handoff process, the sum total of which makes up the total latency. Other factors that could militate against the aim of having a seamless handoff in an inter-subnet network roaming were also considered as well as some proposed solutions. These factors are security, packet loss and triangle routing.
Horndahl, Charles, e Kristian Maric. "WLAN : Oskyddad och okontrollerad datakommunikation". Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-236.
Testo completoThis master’s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:
- What security weaknesses are present with the WLAN-technology and how can these be avoided?
- How does the wireless infrastructure in the Jonkoping region look like?
- Why do companies implement the WLAN-technology?
- Are the companies aware of the risks involved with WLAN?
We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures. The second step of the study was to scan the wireless networks in Jonkoping, Gnosjo and Nassjo in order to create a picture of the wireless infrastructure of the region. The third step of the study was to contact companies that we found in the second step for interviews to investigate their awareness of the technology and its weaknesses.
We found that WLANs and their security measures have weaknesses. The commonly used WEP encryption can quite easily be broken and can lure users into a false sense of security. The study shows that companies are aware of this weakness, but use the encryption be-cause it offers a good level of usability and security. It is a compromise between usability and security. Usability is one of the major factors for companies when implementing wireless networks, companies strive for mobility, easy access and ease of use, which the WLAN technology offers. This has lead to an extended wireless infrastructure in cities within the region where one, with ease, can find wireless networks outside buildings. We have noticed an increase in the security awareness as our empirical findings differ from earlier research conducted in other cities. When these studies are compared you can see a trend where the number of unprotected networks decreases. Our contribution to increased wireless security is a checklist of possible security measures to minimize the security threats.
Denna magisteruppsats undersöker tekniken och säkerhetsmedvetandet gällande trådlösa nätverk (WLAN). Då det tidigare uppmärksammats i media och teori att många trådlösa nätverk står oskyddade har detta skapat intresse att undersöka fenomenet i Jönköpingsregionen. Studien baseras på följande frågeställningar:
- Vilka säkerhetsluckor finns i WLAN och hur kan dessa undvikas?
- Hur ser WLAN-infrastrukturen ut i Jönköpingsregionen?
- Varför implementerar företag WLAN-tekniken?
- Är företag medvetna om riskerna med trådlösa nätverk?
För att skapa en helhetsbild har vi genomfört studien i tre steg varav vi, i det första steget, genomfört dataintrång i en kontrollerad miljö för att undersöka svagheterna med säkerhetsfunktionerna som används i trådlösa nätverk. I det andra steget undersökte vi med hjälp av bärbar dator trådlösa nätverk i Jönköping, Gnosjö och Nässjö. Detta för att skapa oss en uppfattning om hur WLAN-infrastrukturen ser ut i dagsläget. Steg tre innebar intervjuer med företag som vi funnit i samband med steg två rörande deras medvetenhet om tekniken och dess brister.
Teorin och vår empiri gav oss underlag att dra slutsatser utifrån våra frågeställningar. Vi fann att WLAN och dess säkerhetsfunktioner har vissa sårbarheter. Den mest förekommande krypteringstekniken, WEP, kan dekrypteras tämligen enkelt och kan vagga in användarna i en falsk säkerhet. Studien visar att företagen är medvetna om detta, men att det handlar om en medveten kompromiss mellan användarvänlighet och säkerhet. Användarvänligheten står till grund för varför företagen väljer att implementera den trådlösa tekniken. Företag eftersträvar mobilitet, smidighet och enkel access, vilket den trådlösa tekniken erbjuder. Detta har lett till en utökad trådlös infrastruktur i städer runtom i regionen där man med lätthet kan hitta trådlösa nätverk utanför byggnader. Vi har noterat ett ökat säkerhetsmedvetande då våra empiriska resultat skiljer sig något från tidigare undersökningar i andra städer. När dessa ställs mot varandra anar man en trend där antalet oskyddade trådlösa nätverk minskar. Vårt bidrag till ökad trådlös säkerhet är en checklista med möjliga åtgärder för att minimera säkerhetsriskerna.
Elgström, John, e Daniel Teige. "Säkerhet i WLAN för myndigheter". Thesis, Örebro University, Swedish Business School at Örebro University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-4880.
Testo completoI datornätverk blir användandet av WLAN (trådlösa nätverk) allt vanligare tack vare sin smidighet. Det är framförallt bekvämare att använda trådlösa nätverk då man slipper allt kablage och ofta är oberoende av var man befinner sig för att använda nätverket. Trådlösa nätverk är dock inte helt problemfria. Den främsta anledningen till detta är att informationen färdas genom radiovågor istället för genom kablade nätverk. Detta gör att WLAN är i riskzonen för avlyssning, där informationen kan utsättas för obehörig åtkomst om den inte är väl skyddad. Detta problem är grunden till denna uppsats.
Den här uppsatsen är en utredning som har gått ut på att ta fram generella riktlinjer för hur myndigheter skall uppnå god säkerhet i WLAN. Anledningen till att vi ville ta fram generella riktlinjer åt myndigheter var på grund av en rapport vi fann genomförd av krisberedskapsmyndigheten (KBM) 2008. Denna uppmärksammade att myndigheter ofta hoppar på nya tekniker utan att ha tillräckligt kunskap nog om dem, och att säkerhetstänket ofta får låg prioritet vid införandet av nya system. Ytterligare en artikel skapade av KBM från 2007, pekar på att myndigheter även har bristande säkerhet i sina DNS-system.
Eftersom vi koncentrerade oss på WLAN funderade vi då på, om nu säkerhetstänket får så låg prioritet och är så dåligt ställt i myndigheternas DNS-system, hur är det då ställt med säkerheten i WLAN?
Vi konstaterade efter att vi gjort förfrågningar till flera myndigheter, att ytterst få myndigheter hade något WLAN eller planerade att införskaffa det. Anledning till detta tror vi var att myndigheter var skeptiska till att det går att få ett WLAN säkert och hade bristande kunskap inom området.
Vi tog fram de generella riktlinjerna genom en kvalitativ metodansats, där vi genomfört litteraturstudier, undersökning av myndigheters policys samt intervju av expert på WLAN.
Resultatet visade att myndigheter behöver både administrativa säkerhetsåtgärder, tekniska säkerhetsåtgärder samt en specifik fysisk säkerhetsåtgärd för att uppnå god säkerhet i WLAN.
Libri sul tema "WLAN"
Wireless local area network (WLAN) best practices guide. [Edmonton]: Stakeholder Technology Branch, 2007.
Cerca il testo completoYong, Su-Khiong SK, Pengfei Xia e Alberto Valdes-Garcia, a cura di. 60 GHz Technology for Gbps WLAN and WPAN. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470972946.
Testo completoNeeli, Prasad, e Prasad Anand, a cura di. WLAN systems and wireless IP for next generation communications. Boston, MA: Artech House, 2002.
Cerca il testo completoMedosch, Armin. Freie Netze: Geschichte, Politik und Kultur offener WLAN-Netze. Hannover: Heise, 2004.
Cerca il testo completoImmler, Christian. Windows 7 Pannenhilfe: WLAN, Internet & E-Mail, Fotos & Musik. Poing: Franzis, 2011.
Cerca il testo completoLTE, WIMAX, and WLAN network design, optimization and performance analysis. Chichester, West Sussex, U.K: Wiley, 2011.
Cerca il testo completoMohammadi, Behnam. A 5.8 GHz CMOS low noise amplifier for WLAN applications. Ottawa: National Library of Canada, 2003.
Cerca il testo completoMa, Dennis Kwok-Leung. A subharmonically-injected quadrature LO generator for 17GHz WLAN applications. Ottawa: National Library of Canada, 2003.
Cerca il testo completoKorowajczuk, Leonhard. LTE, WIMAX and WLAN Network Design, Optimization and Performance Analysis. Chichester, UK: John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119970460.
Testo completoN, Plataniotis Konstantinos, e Venetsanopoulos, A. N. (Anastasios N.), 1941-, a cura di. WLAN positioning systems: Principles and applications in location-based services. Cambridge: Cambridge University Press, 2012.
Cerca il testo completoCapitoli di libri sul tema "WLAN"
Colhoun, O. "WLAN". In Springer Reference Medizin, 2514. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-48986-4_3329.
Testo completoColhoun, O. "WLAN". In Lexikon der Medizinischen Laboratoriumsdiagnostik, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-49054-9_3329-1.
Testo completoOsterhage, Wolfgang W. "WLAN". In Sicherheitskonzepte in der mobilen Kommunikation, 7–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57903-9_3.
Testo completoOsterhage, Wolfgang W. "WLAN Architektur". In sicher & mobil, 45–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_3.
Testo completoOsterhage, Wolfgang W. "WLAN Geräte". In sicher & mobil, 57–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_4.
Testo completoShekhar, Shashi, e Hui Xiong. "WLAN Geolocation". In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1496.
Testo completoShekhar, Shashi, e Hui Xiong. "WLAN Localization". In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1497.
Testo completoAnamalamudi, Satish, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya e Chang Liu. "5G-WLAN Security". In A Comprehensive Guide to 5G Security, 143–63. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch7.
Testo completoOsterhage, Wolfgang W. "Grundzüge des WLAN". In sicher & mobil, 3–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_2.
Testo completoSchwenk, Jörg. "Drahtlose Netzwerke (WLAN)". In Sicherheit und Kryptographie im Internet, 91–110. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_6.
Testo completoAtti di convegni sul tema "WLAN"
Chen, Eason, Jeng Yuan Lai, Ming Zong Wang, Yu-Po Wang e C. S. Hsiao. "Optimized Thermal Design for USB-WLAN Module". In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-82247.
Testo completoNanda, Rohan, e P. Venkata Krishna. "D0M-WLAN". In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523575.
Testo completo"WLAN/WPAN". In 2006 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2006. http://dx.doi.org/10.1109/isscc.2006.1696191.
Testo completoChien, George, e Mototsugu Hamada. "WLAN/Bluetooth". In 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2007. http://dx.doi.org/10.1109/isscc.2007.373541.
Testo completoBehzad, Arya, e Tadashi Maeda. "WLAN/WPAN". In 2008 International Solid-State Circuits Conference - (ISSCC). IEEE, 2008. http://dx.doi.org/10.1109/isscc.2008.4523203.
Testo completoKrätzer, Christian, Jana Dittmann, Andreas Lang e Tobias Kühne. "WLAN steganography". In Proceeding of the 8th workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161371.
Testo completoMing-Chia Jiang, Jyh-Cheng Chen e Yi-Wen Liu. "WLAN-centric authentication in integrated GPRS-WLAN networks". In 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484). IEEE, 2003. http://dx.doi.org/10.1109/vetecf.2003.1285928.
Testo completoDebBarma, Diptanil. "Energy efficient RoF based centralized enterprise WLAN (CE-WLAN)". In IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON). IEEE, 2015. http://dx.doi.org/10.1109/eurocon.2015.7313695.
Testo completoLee, Kimin, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin e Song Chong. "Just-in-time WLANs: On-demand interference-managed WLAN infrastructures". In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications. IEEE, 2016. http://dx.doi.org/10.1109/infocom.2016.7524451.
Testo completoPackiaraj, D., M. Ramesh, A. T. Kalghatgi e K. J. Vinoy. "Dual band(WLAN". In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734739.
Testo completoRapporti di organizzazioni sul tema "WLAN"
Kaippallimalil, J., R. Pazhyannur e P. Yegani. Mapping Quality of Service (QoS) Procedures of Proxy Mobile IPv6 (PMIPv6) and WLAN. RFC Editor, giugno 2015. http://dx.doi.org/10.17487/rfc7561.
Testo completoThangavel, Kalavathi Devi, Sakthivel Palaniappan e Sathish Kumar Shanmugam. Performance Analysis of VLSI Architecture of Viterbi Decoder in WLAN Using the Sleepy Keeper Technique. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, agosto 2020. http://dx.doi.org/10.7546/crabs.2020.08.11.
Testo completoHousley, R., e T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, maggio 2004. http://dx.doi.org/10.17487/rfc3770.
Testo completoHousley, R., e T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, febbraio 2006. http://dx.doi.org/10.17487/rfc4334.
Testo completoKrishnan, Michael N. Exploiting Spatial Channel Occupancy Information in WLANs. Fort Belvoir, VA: Defense Technical Information Center, maggio 2014. http://dx.doi.org/10.21236/ada605338.
Testo completoMasica, K. Recommended Practices Guide Securing WLANs using 802.11i. Office of Scientific and Technical Information (OSTI), ottobre 2006. http://dx.doi.org/10.2172/1036841.
Testo completoSouppaya, M. P., e K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.
Testo completo