Results 71 to 80 of about 335,598 (166)

Langattoman lähiverkon tietoturva [PDF]

open access: yes, 2015
Langattomien verkkotekniikoiden hyödyntäminen eri käyttöympäristöissä yleistyy jat-kuvasti. WLAN-verkkojen kehittämisen tarve näkyy kuluttaja- ja yritysympäristöissä.
Mononen, Mika, Nurmi, Hannes
core  

Analysis and Demonstration of Selected Wireless Attacks in OS Windows [PDF]

open access: yes, 2012
Tahle bakalářská práce popisuje dostupné technologie používané k zabezpečení bezdrátových sítí a nedostatky a chyby, které tyto technologie obsahují.
Husár, Michal
core  

Wireless network security and cracking security key [PDF]

open access: yes, 2014
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module)
Bikov, Dusan   +2 more
core  

PENGARUH DATA RATE TERHADAP THROUGHPUT DAN DELAY MENGGUNAKAN SISTEM KEAMANAN WPA DAN WPA2 PADA JARINGAN WIFI [PDF]

open access: yes, 2016
ABSTRAKWiFi Alliance telah menetapkan dua standar baru sistem keamanan jaringan WiFi, yaitu Wi-fi Protected Access (WPA) dan Wi-fi Protected Access II (WPA2).
Abdul Muthalib
core  

Current trends in the security of Wi-Fi IEEE 802.11 networks [PDF]

open access: yes, 2014
Tato práce popisuje možnosti zabezpečení standardu 802.11. Je zde popsán princip WEP algoritmu, problém s jeho inicializačním vektorem, který vede k statistickému útoku a odhalení jeho tajného klíče. Mimo to jsou zde vysvětleny principy dalších algoritmů
Blažek, Ondřej
core  

UEG Week 2025 Poster Presentations

open access: yes
United European Gastroenterology Journal, Volume 13, Issue S8, Page S803-S1476, October 2025.
wiley   +1 more source

Mecanismos y estrategias de seguridad en redes Wi-Fi [PDF]

open access: yes, 2014
En los últimos años, la utilización de las redes inalámbricas ha crecido de manera exponencial, principalmente, en lugares donde se opta por esta tecnología tanto para la transmisión de datos entre dispositivos inalámbricos, como para el acceso de estos ...
Meneses Angón, Emanuel   +1 more
core  

Abstract

open access: yes
JPGN Reports, Volume 6, Issue S2, Page S1-S814, September 2025.
wiley   +1 more source

On the security of XCBC, TMAC and OMAC [PDF]

open access: yes
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. The results imply that there is relatively little to be gained practically through the introduction of these schemes by comparison with other well ...
Chris J. Mitchell, Chris J.
core  

A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]

open access: yes
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core  

Home - About - Disclaimer - Privacy