|
Search the dblp DataBase
Jesse Walker:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nancy Cam-Winget, Russell Housley, David Wagner, Jesse Walker
Security flaws in 802.11 data link protocols. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:5, pp:35-39 [Journal]
- David Johnston, Jesse Walker
Overview of IEEE 802.16 Security. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:40-48 [Journal]
- Cynthia Kuo, Adrian Perrig, Jesse Walker
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. [Citation Graph (0, 0)][DBLP] Interactions, 2006, v:13, n:3, pp:28-31 [Journal]
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|