Searched for: "authentication in wireless networks"
- Security (566)
- Mobility (369)
- Networking (155)
- Enterprise Software (27)
- Data Management (13)
- Microsoft (10)
- Software (8)
- Cloud (7)
- Hardware (7)
- Big Data (4)
- Developer (4)
- Open Source (4)
- Apple (3)
- Android (2)
- Cxo (2)
- Data Centers (2)
- Banking (1)
- Collaboration (1)
- Consumerization (1)
- E-Commerce (1)
- Google (1)
- Project Management (1)
- Social Enterprise (1)
About 1195 results for "authentication in wireless networks"
Ethical hackers from IBM's X-Force pen tested a building automation system and encountered numerous security issues. For starters, they co-opted a vulnerable router.
Methodology for Deploying a Security Framework in Mission Critical Infrastructure Based Wireless Sensor Networks
In this paper, the authors present a methodology on design of a security framework for Wireless Sensor Network (WSN). This framework is proposed for an infrastructure based deploym...
Wireless sensor networks consist of sensor nodes which move randomly. Energy based routing in wireless sensor network is a demanding assignment. Power aware routing which attains a...
Mobile Ad hoc NETworks (MANETs) have become a significant emerging technology in mobile computing. In recent years, there has been an enormous use of mobile computing devices that ...
In some critical application in Wireless Sensor Network (WSN) there is huge demand for authentication. Irreversible modification where made in watermarked data according to previou...
MANETs (Mobile Ad-hoc NETworks) is a self-organizing networks and it consist of mobile nodes are connected through wireless media. Main unique features are open communication chann...
Packet dropping is common attacks occur in wireless ad hoc network. This threat occurs when the data is transmitted from one source to destination. The attack may be classified int...
Recent advancements in technology, tiny size and cost effectiveness have made sensors as a crucial part of real world sensitive applications. Many Denial of Service (DoS) attacks a...
Wireless communication is very extensively used in the current world and the people are rapidly moving to a hands-free swift world. Even with the arrival of advancements at such a ...
Wireless Mesh Networks (WMNs) have recently attracted increasing attention and deployment as a promising low-cost approach to provide last-mile high-speed Internet access at metrop...