Osterhage, 2011 - Google Patents
Wireless securityOsterhage, 2011
- Document ID
- 10571154340852752867
- Author
- Osterhage W
- Publication year
External Links
Snippet
In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications …
- 238000005516 engineering process 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Chahid et al. | Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art | |
US7565529B2 (en) | Secure authentication and network management system for wireless LAN applications | |
Potter et al. | 802.11 Security | |
CN104661213A (en) | Novel unit and user equipment for providing scheduled network resources by WiFi network | |
Chaouchi et al. | Wireless and Mobile Networks Security | |
Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
Osterhage | Wireless security | |
Williams | The IEEE 802.11 b security problem. 1 | |
Wong | Performance investigation of secure 802.11 wireless LANs: Raising the security bar to which level? | |
Firdus et al. | WiFi from past to today, consequences that can cause and measures of prevention from them, WiFi security protocols | |
Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
Henry | CCNA Wireless (640-722 IUWNE) Quick Reference | |
Jaiaree | The security aspects of wireless local area network (WLAN) | |
Sutton | Hacking the invisible network | |
Rassam | Security of Wi-Fi Networks | |
Jøsang | Wireless Security | |
Chakraborty et al. | An Extensive Review of Wireless Local Area Network Security Standards | |
Reynolds | An IT and Security Comparison Decision Support System for Wireless LANs: 802. 11 Infosec and Wifi LAN Comparison | |
Scarfone et al. | Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks | |
Ma et al. | Security Access in Wireless Local Area Networks | |
Gambiraopet | Security threats and intrusion detection models in WLAN | |
Diakite | WISP: A Wireless Information Security Portal | |
Kamaruddin | Security performance of a wireless LAN testbed | |
Tay | Wireless LAN extension |