<p><P>Heterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous wireless networking. The chapters cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of arc
Security Access in Wireless Local Area Networks: From Architecture and Protocols to Realization
โ Scribed by Prof. Jianfeng Ma, Dr. Changguang Wang, Dr. Zhuo Ma (auth.)
- Publisher
- Springer Berlin Heidelberg
- Year
- 2009
- Tongue
- English
- Leaves
- 441
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
ะ/ะ
โฆ Table of Contents
Front Matter....Pages I-XIX
Introduction....Pages 1-28
Security Architecture Framework....Pages 29-85
Security Access Protocol....Pages 87-134
Security Protocols for Fast BSS transition....Pages 135-173
Security Protocols in WLAN Mesh....Pages 175-230
Authenticated Key Exchange Protocol....Pages 231-264
Privacy Protection for WLAN....Pages 265-294
Adaptive Security Policy....Pages 295-329
Evaluation Method of Security Performance....Pages 331-366
Architecture of Trusted Terminal....Pages 367-399
Architecture of Trusted Network Connect....Pages 401-423
Back Matter....Pages 425-431
โฆ Subjects
Computer Science, general; Communications Engineering, Networks; Electrical Engineering; Facility Management
๐ SIMILAR VOLUMES
<p>This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing th
<p>Wireless Local Area Networks (WLANs) are experiencing a growing importance recently. Whereas WLANs were primarily used for niche applications in the past, they are now deployed as wireless extensions to computer networks. The increase of the datarates from 2 Mbps up to 11 Mbps for roughly a const