Improving QoS of VoIP over WLAN (IQ-VW) (2002)

Cached

Download Links

by Mona Habib , Nirmala Bulusu

Active Bibliography

9 A Multiplex-Multicast Scheme that Improves System Capacity of Voice-over-IP – Wei Wang, Soung C. Liew, Qixiang Pang - 2004
42 Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN – Wei Wang, Student Member, Soung Chang Liew, Senior Member, Victor O. K. Li - 2005
at the University of Kentucky By – Anshul Jain, Anshul Jain
APPROVED FOR THE UNIVERSITY ABSTRACT Securing Wireless Networks from ARP Cache Poisoning – Presented To, Roney Philip, Roney Philip, Roney Philip, Roney Philip - 2007
6 Security issues in privacy and key management protocols of IEEE 802.16 – Sen Xu, Manton Matthews, Chin-tser Huang - 2006
Securing Wireless Networks from ARP Cache Poisoning – Sjsu Scholarworks, Roney Philip, Presented To, Roney Philip, Roney Philip
Public-Key-based Secure Internet Access – Daniel B. Faria
Wireless Network Monitoring – Master's Plan Report, Sandeep P Karanth, Prof Anand Tripathi
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines – Usage Guidelines Status, A. Smith, G. Zorn, J. Roese
2 Securing WiFi Nomads: The Case for Quarantine, Examination, and Decontamination – Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald Popek, V. Ramakrishna, Peter Reiher - 2003
2 IEEE 802.11i WLAN Security Protocol – A Software Engineer’s Model – Elankayer Sithirasenan, V. Muthukkumarasamy, Danny Powell - 2005
1 Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs – Yang Xiao, Chaitanya Bandela, Xiaojiang (James) Du, Yi Pan, Edilbert Kamal Dass - 2006
ubiquitous systems based in Rijndael´s algorithm to – Salvador Gómez Pedraz, Juan Antonio, Rodrigo Yanes, José Antonio Gutiérrez, De Mesa, Javier De Pedro Carracedo
5 A Survey of WPA and 802.11i RSN Authentication Protocols – Kwang-hyun Baek, Sean W. Smith, David Kotz - 2004
A Note on the Fragility of the “Michael ” Message Integrity Code Avishai Wool, Senior Member, IEEE – unknown authors
Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach – Debabrata Nayak, Deepak B. Phatak, Ashutosh Saxena - 2006
Physical Security Perimeters for Wireless Local Area Networks – Vishal Bhargava, Mihail L. Sichitiu - 2005
Version 1.4 802.11, 802.1x, and Wireless Security – J. Philip Craiger - 2002
Author Retains Full Rights AD Is Your Wireless Network Secure? – Ken Hodges - 2001