Securing wireless networks with enhanced WEP
International Society for Computers and Their Applications
Saved in:
| Main Author: | Haraty, Ramzi A. (author) |
|---|---|
| Other Authors: | El Horr, Walid (author) |
| Format: | conferenceObject |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/10725/6983 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://dblp.org/db/conf/caine/caine2006 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A three poled model for web applications
by: Haraty, Ramzi A.
Published: (2006) -
A comparative study of replacement algorithms used in the scalable asynchronous cache consistency scheme
by: Haraty, Ramzi A.
Published: (2006) -
Transaction Acceleration in Secure Database Systems
by: Haraty, Ramzi A.
Published: (2018) -
Secure transaction management and query processing in multilevel secure database systems
by: Haraty, Ramzi
Published: (1994) -
C2 secure database management systems
by: Haraty, Ramzi A.
Published: (1999)