Results 71 to 80 of about 313,696 (165)

Wireless network security and cracking security key [PDF]

open access: yes, 2014
Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module)
Bikov, Dusan   +2 more
core  

Abstract

open access: yes
JPGN Reports, Volume 6, Issue S2, Page S1-S814, September 2025.
wiley   +1 more source

Mecanismos y estrategias de seguridad en redes Wi-Fi [PDF]

open access: yes, 2014
En los últimos años, la utilización de las redes inalámbricas ha crecido de manera exponencial, principalmente, en lugares donde se opta por esta tecnología tanto para la transmisión de datos entre dispositivos inalámbricos, como para el acceso de estos ...
Meneses Angón, Emanuel   +1 more
core  

Current trends in the security of Wi-Fi IEEE 802.11 networks [PDF]

open access: yes, 2014
Tato práce popisuje možnosti zabezpečení standardu 802.11. Je zde popsán princip WEP algoritmu, problém s jeho inicializačním vektorem, který vede k statistickému útoku a odhalení jeho tajného klíče. Mimo to jsou zde vysvětleny principy dalších algoritmů
Blažek, Ondřej
core  

On the security of XCBC, TMAC and OMAC [PDF]

open access: yes
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. The results imply that there is relatively little to be gained practically through the introduction of these schemes by comparison with other well ...
Chris J. Mitchell, Chris J.
core  

Plenary Abstracts Session & Oral Presentations

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Poster Sessions

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]

open access: yes
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core  

Home - About - Disclaimer - Privacy