Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Information Technology & Standardization》 2004-11
Add to Favorite Get Latest Update

A Closed Look to IEEE 802.11i

This paper introduces IEEE 802.11isecurity standard for WLAN, including its concept,background, attribute and its technological details. It alsonarrates in detail WPA. Several key techniques used toimplement IEEE 802.11i WLAN are also discussed in thispaper. In the end, we make a conclusion.
【CateGory Index】: TN925.93
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Zhao Peng 1 Luo Ping 1 Cao Xuewu 21 (Department of Computer Science&Technology,Tsinghua University,Beijing100084) 2 (Department of Computer Science&Technology,Beijing University of Aeronautics and Astronautics,Beijing100083);Improve the Security of Wireless Local Area Network(WLAN)[J];Computer Engineering and Applications;2004-02
2 Software Lab. of Taiyuan Sci-tech Bureau Guo liqun;The Principle and Application of IEEE 802.1x[J];Taiyuan Science and Technology;2003-06
3 XING Xin-jing, ZHANG Zhao-yang, WANG Kuang (Dept. of Information and Electronic Engineering, Zhejiang University,HangZhou 310027,China);Security Analysis of WEP Algorithm Used in IEEE 802.11[J];Wireless Communication Technology;2003-04
【Co-citations】
Chinese Journal Full-text Database 8 Hits
1 ZHANG Zong-fu(Jiangmen Vocational and Technical College,Jiangmen,Guangdong 529000,China);WLAN Security Issues and Solutions[J];Computer Security;2011-06
2 TU Jun,ZHANG Ying-jiang,HUANG Qin-ju(School of Computer,Hubei Univ.of Technology,Wuhan 430068,China);The Safety of WLAN[J];Journal of Hubei University of Technology;2006-04
3 Zhang Hao Wang Peidong Wang Yan(Dept.of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080);Application of Adjacent Bits XOR Arithmetic of Key Replacement Based on WEP Protocol[J];Computer & Digital Engineering;2010-03
4 GUO Chao,ZHANG Wei-min,YAO Lei-bo,DONG Hong-zheng (Department of Electrical Engineering and Automation,Luoyang Institute of Science and Technology,Luoyang 471023,China);An Improved Method of EAP-TLS Fast Reauthentication[J];Computer and Modernization;2010-09
5 Peng Qi Zhang Liling(1.Jiangxi Industry Polytechnic College,Jiangxi Nanchang 330099;2.Department of Mechanical and Power Engineering,Nanchang Institute of Technology,Jiangxi Nanchang 330099);Research and Application of Network Security Certification Based on 802.1X/EAP in WLAN[J];Science Mosaic;2010-03
6 YANG Ya-tao, WANG Man-zhu, WEI zhan-zhen, HE Wen-cai(Communication engineering Department, BESTI, Beijing 100070);Security Weakness Analysis and Strategy for WEP Used in 802.11 WLAN[J];Microelectronics & Computer;2005-02
7 ZHANG Hua (College of City,Wenzhou University,Wenzhou 325000);Research on Security Mechanisms and Improvement of WLAN Based on 802.1X Protocol[J];Modern Computer;2012-06
8 CHEN He,CAO Ke;Technology Research and Management for WLAN's Security[J];Modern Machinery;2006-04
China Proceedings of conference Full-text Database 1 Hits
1 XIE Xu-sheng,WEI Gen-ya (Institute of Computer Information and Engineering,Jiangxi Normal University,Nanchang Jiangxi 330022,China);Improvement and Implementation of Campus Network Authentication System Based on IEEE802.1x[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CHEN Yong-chun 1,XU Shu-xin2(1.GCC of China Electronics,100089;2.China Tietong Telecommunications Corporation Beijing Branch,Beijing 100055,China);Design and Implementation of a WiMax Modem Platform[J];Telecommunication Engineering;2007-06
2 Huang Yuhua Hu Aiqun Song Yubo (Department of Radio Engineering, Southeast University, Nanjing 210096, China);Research on fast authentication modes of block cipher algorithm and their designs[J];Journal of Southeast University (Natural Science Edition);2004-02
3 Zuo Xiaodong Dai Yingxia National Lab of Information Security,the Chinese Academy of Science, Beijing 100039;Analysis on the Security of Wireless LAN[J];Telecommunications Science;2001-07
4 Wu Yue,Cao Xiuying,Hu Aiqun,Bi Guangguo(Dept. of Radio Engineering,Southeast University,Nanjing 210096);Research on Security Technology of Wireless Local Area Network[J];Telecommunications Science;2002-06
5 Zhang Yunyong (China Unicom, Beijing 100032,China);Research of IEEE 802.16d Based WiMAX Security[J];Telecommunications Science;2007-08
6 SUN Hong,YANG Yi-xian (Information Security Center,Beijing Univ.of Posts & Telecomm,Beijing 100876,China);On the Security of Wireless Network Protocol 802.11[J];Acta Electronica Sinica;2003-07
7 WU Wen-Ling FENG Deng-Guo(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080);The State()-of-The()-Art of Research on Block Cipher Mode of Operation[J];Chinese Journal of Computers;2006-01
8 CHEN Xi 1,ZHENG Ji rong 2 (1.Microwave and Digital Communication State Key Lab, Tsinghua University, Beijing 100084,China; 2.EDA and Network Application Lab, Tsinghua Research Institute in Shenzhen, Shenzhen Guangdong 518057,China);Security Mechanism and Analysis of Wireless Local Area Network[J];Computer Applications;2003-03
9 LIU Qi,HE Lian yue,YANG Can qun (College of Computer,National University of Defense Technology,Changsha Hunan 410073,China);Information Security Assurance of WLAN[J];Computer Applications;2003-04
10 JIANG Haifeng1,MIAO Fang2 (1. College of information management, Chengdu University of Technology, Chengdu Sichuan 610059, China; 2. College of information engineering, Chengdu University of Technology, Chengdu Sichuan 610059, China);Research on the Extended Application of 802.1x Standard and RADIUS Protocol[J];Computer Applications;2003-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved