Academic literature on the topic 'WIRELESS LAN TECHNOLOGY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WIRELESS LAN TECHNOLOGY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WIRELESS LAN TECHNOLOGY"

1

Nakano, Kazumasa. "Wireless LAN Technology for Ship." Journal of The Japan Institute of Marine Engineering 49, no. 5 (2014): 607–10. http://dx.doi.org/10.5988/jime.49.607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerji, Sourangsu, and Rahul Singha Chowdhury. "On IEEE 802.11: Wireless Lan Technology." International Journal of Mobile Network Communications & Telematics 3, no. 4 (2013): 45–64. http://dx.doi.org/10.5121/ijmnct.2013.3405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Z., S. Song, J. Chen, H. Wang, J. Huang, and X. Gao. "A wireless LAN-based indoor positioning technology." IBM Journal of Research and Development 48, no. 5.6 (2004): 617–26. http://dx.doi.org/10.1147/rd.485.0617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

She, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.

Full text
Abstract:
Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplican
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jun Lei, Hui Min Zhang, Cui Min Lian, and Rong Li. "Applications of the Wireless LAN Technology in the Nursing Work." Advanced Engineering Forum 4 (June 2012): 19–21. http://dx.doi.org/10.4028/www.scientific.net/aef.4.19.

Full text
Abstract:
With the rapid development of computer network technology, wireless networks have developed to wireless wide area network from a single wireless personal area network. Expansion of coverage was spread from a few meters to a global range and transmission speed was also doubled. The wireless network is gradually used into complicated module network environment, especially in the field of medical treatment, depending on the flexibility and the sound extendibility of its module network. This article is to introduce the wireless LAN technique and its character, and also to express its scientific us
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, Li Li. "Wireless LAN Security Vulnerabilities and Improvement Measures." Applied Mechanics and Materials 543-547 (March 2014): 3335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3335.

Full text
Abstract:
This paper mainly analyzed the security of TKIP protocol and VPN technology ,the wireless LAN 802.11 and 802.1x/EXP security vulnerabilities: defects of SSID and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WEP Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The author put forward improvement authentication and encryption method as improving wireless LAN security measures.
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Jiujun, Liufei Hu, Junjun Liu, Qingyang Zhang, and Chendan Yan. "A New Mechanism for Network Monitoring and Shielding in Wireless LAN." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/620926.

Full text
Abstract:
Wireless LAN (WLAN) technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid
APA, Harvard, Vancouver, ISO, and other styles
8

Ghadage, Shivani, Swapnali Joshi, and Shweta Thorat. "Wi-Fi Technology." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 1068–69. http://dx.doi.org/10.22214/ijraset.2022.48112.

Full text
Abstract:
Abstract: Technology is making rapid progress and is making many things easier. As the innovative thinking of persons is increasing day-by-day, new methods for wireless networking has been evolved of which our Wi-Fi, (Wireless Fidelity) is a trademark that belongs to the Wi-Fi Alliance. It is name commonly used for the standard of wireless (radio) connection that integrates several protocols and is based on a family of IEEE 802.11 standards (Institute of Electrical and Electronic Engineers is an international organization dedicated to the development of standards in electronic technology). The
APA, Harvard, Vancouver, ISO, and other styles
9

TOKUNAGA, Masashi, Ryoma NISHIMURA, and Syunji NAGAMI. "Wireless LAN of Newest Technology in High-Speed Mobile Object." Journal of The Institute of Electrical Engineers of Japan 127, no. 8 (2007): 545–48. http://dx.doi.org/10.1541/ieejjournal.127.545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiong, Yongping, Ruogu Zhou, Minming Li, Guoliang Xing, Limin Sun, and Jian Ma. "ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery." IEEE Transactions on Mobile Computing 13, no. 11 (2014): 2675–88. http://dx.doi.org/10.1109/tmc.2014.2309610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!