Results 71 to 80 of about 313,696 (165)
Wireless network security and cracking security key [PDF]
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module)
Bikov, Dusan +2 more
core
Mecanismos y estrategias de seguridad en redes Wi-Fi [PDF]
En los últimos años, la utilización de las redes inalámbricas ha crecido de manera exponencial, principalmente, en lugares donde se opta por esta tecnología tanto para la transmisión de datos entre dispositivos inalámbricos, como para el acceso de estos ...
Meneses Angón, Emanuel +1 more
core
Current trends in the security of Wi-Fi IEEE 802.11 networks [PDF]
Tato práce popisuje možnosti zabezpečení standardu 802.11. Je zde popsán princip WEP algoritmu, problém s jeho inicializačním vektorem, který vede k statistickému útoku a odhalení jeho tajného klíče. Mimo to jsou zde vysvětleny principy dalších algoritmů
Blažek, Ondřej
core
On the security of XCBC, TMAC and OMAC [PDF]
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. The results imply that there is relatively little to be gained practically through the introduction of these schemes by comparison with other well ...
Chris J. Mitchell, Chris J.
core
Plenary Abstracts Session & Oral Presentations
HemaSphere, Volume 9, Issue S1, June 2025.
wiley +1 more source
A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core
Single-cell RNA sequencing of the spleen reveals differences in Salmonella typhimurium infection mechanisms between different chicken breeds. [PDF]
Zhang Q +9 more
europepmc +1 more source

