Zobrazeno 1 - 10
of 124
pro vyhledávání: '"Temporal Key Integrity Protocol"'
Autor:
Ryoma Ito, Atsuko Miyaji
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :190-202
Autor:
Raman Kumar
Publikováno v:
Wireless Personal Communications. 115:1541-1563
Financial Cryptography and Security Engineering are the significant areas for research, advanced development, education, exploration and also for commercial purposes. The paper emphasizes both essential and applied real-world deployments on all aspec
Autor:
Ryoma Ito, Atsuko Miyaji
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. (1):138-148
The RC4 stream cipher is widely used including WEP and WPA, which are the security protocols for IEEE 802.11 wireless standard. WPA improved a construction of the RC4 key setting known as TKIP to avoid the known WEP attacks. The first 3-byte RC4 keys
Publikováno v:
AsiaCCS
We measure the usage of cipher suites in protected Wi-Fi networks, and do this for several distinct geographic areas. Surprisingly, we found that 44.81% of protected networks still support the old WPA-TKIP cipher. Motivated by this, we systematically
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811362637
CSPS (1)
CSPS (1)
Adaptive heuristic for opponent classification (ad hoc) network is characterized by its decentralized structure. All the nodes in ad hoc network are same level and have the ability of message forwarding, which can realize multi-hop communication, wit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b0e450442431a92fe931df0b7ab747c1
https://doi.org/10.1007/978-981-13-6264-4_114
https://doi.org/10.1007/978-981-13-6264-4_114
Publikováno v:
International Journal of Engineering and Management Research. 8
The growing volume of attacks on the Internet has increased the demand for more robust systems and sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technolo
Autor:
Anil Kumar, Partha Paul
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811082337
The significance of wireless devices has been growing day by day. Performance and security are an essential issue, leading to more trustworthy and effective communications. IEEE 802.11i is the most updated security protocol for wireless LAN. Authenti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76b6029a273c0c4f0b8df015075723da
https://doi.org/10.1007/978-981-10-8234-4_58
https://doi.org/10.1007/978-981-10-8234-4_58
Autor:
Zi Gui Jiang
Publikováno v:
Advanced Materials Research. :1993-1996
Wi-Fi becomes increasingly popular for people who use smart phones, tablet computers and laptops frequently. It is essentially for users to understand the security problems of Wi-Fi in order to prevent information leakage. The key wireless security s
Autor:
Shumei Wang, Hong-Yang Ma
Publikováno v:
Wireless Personal Communications. 80:193-202
This paper addresses the security WLAN protocol based on Quantum Greenberger---Horne---Zeilinger stats to overcome the flaws of wired equivalent privacy, temporal key integrity protocol, counter mode with CBC-MAC protocol, IEEE802.11i protocol, and e
Publikováno v:
International Journal on AdHoc Networking Systems. 4:1-7
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy to use. There are some challenges of security and for IT administrators the choice of security protocol is a critical issue. The main motive o