[PDF][PDF] A survey on various most common encryption techniques

E Thambiraja, G Ramesh, DR Umarani - International journal of …, 2012 - academia.edu
This talk will present a perspective on the current state of play in the field of encryption
algorithms, in particular on private key block ciphers which are widely used for bulk data and …

An enhanced WLAN security system with FPGA implementation for multimedia applications

T Hayajneh, S Ullah, BJ Mohd… - IEEE Systems …, 2015 - ieeexplore.ieee.org
Maintaining a high level of data security with a low impact on system performance is more
challenging in wireless multimedia applications. Protocols that are used for wireless local …

The performance of different IEEE802. 11 security protocol standard on 2.4 GHz and 5GHz WLAN networks

TAT Aziz, MR Abd Razak… - 2017 International …, 2017 - ieeexplore.ieee.org
The availability and reasonable cost of broadband Internet made it an attractive and
favourable option to billions of users worldwide. Being a fast service also encourages its …

[PDF][PDF] Analyzing the impact of security protocols on wireless LAN with multimedia applications

T Hayajneh, S Khasawneh, B Mohd… - Proc. of The Sixth …, 2012 - academia.edu
The availability and reasonable cost of broadband Internet made it an attractive and
favorable option to billions of users worldwide. Being a fast service also encourages its …

Performance analysis of wireless network with the impact of security mechanisms

M Ahmad, S Taj, T Mustafa… - … Conference on Emerging …, 2012 - ieeexplore.ieee.org
The growing popularity and evolutionary nature of Wireless local area networks have raised
some serious security issues to its users which are being solved by advanced security …

WPA2 security-bandwith trade-off in 802.11 n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems

SS Kolahi, P Li, M Argawe… - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
In this paper, we present new results on the performance of IEEE 802.11 n using open
system (no security) and WPA2 security for Windows XP and Windows 7. Enabling WPA2 …

Study and performance evaluation of security-throughput tradeoff with link adaptive encryption scheme

P Jindal, B Singh - arXiv preprint arXiv:1211.5080, 2012 - arxiv.org
With the ever increasing volume of information over wireless medium, security has assumed
an important dimension. The security of transmitted data over a wireless channel aims at …

Performance analysis of wireless network throughput and security protocol integration

PA Ochang, P Irving - … Journal of Future Generation Communication and …, 2016 - earticle.net
Wireless network security protocols are essential for enhancing security, privacy and
confidentiality. However, network security protocols also require network resources in other …

[PDF][PDF] Performance evaluation of security-throughput tradeoff with channel adaptive encryption

P Jindal, B Singh - International Journal of Computer Network and …, 2013 - mecs-press.org
With the ever increasing volume of information over wireless medium, security has assumed
an important dimension. The security of transmitted data over a wireless channel aims at …

Security-performance tradeoffs in a class of wireless network scenarios

P Jindal, B Singh - Journal of Network and Systems Management, 2017 - Springer
There has been an extensive and widespread deployment of wireless local area networks
(WLANs) for information access. The transmission, being of a broadcast nature, is …