Back to Results
First PageMeta Content
Computing / Computer network security / Data / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / IEEE 802.1X / Wireless security / Extensible Authentication Protocol / Cryptography / Cryptographic protocols / Wireless networking


Microsoft Word - NDSS05.doc
Add to Reading List

Document Date: 2005-06-17 01:35:04


Open Document

File Size: 186,22 KB

Share Result on Facebook

Company

SNonce SPA / Introduction As Wireless Local Area Networks / the AES / /

Facility

SPA RSN IE / Bogus Beacon / Computer Science Departments Stanford University / /

IndustryTerm

Internet access / infrastructure networks / wireless station / integrity protocols / data confidentiality protocol / authentication server / legitimate device / wireless network / protected data packets using data confidentiality protocols / data integrity algorithm / victim device / data confidentiality protocols / higher layer protocols / online messages / moderate equipment / wireless networking standard / wireless security research / wireless networks / server / legacy devices / ad hoc networks / virtual carrier-sense mechanism / wireless networking / wireless links / Wireless Threats In order / capable networks / multicast applications / encryption algorithm / wireless security / authentication protocols / mutual authentication protocol / wireless communication / virtual carrier-sense / wireless devices / security algorithms / /

OperatingSystem

DoS / /

Organization

MAC Protocol Data Unit / Stanford University / Robust Security Network Association / MAC Service Data Unit / /

Person

John C Mitchell / /

Position

network administrator / Central Manager / /

Product

Message Injection / /

SportsLeague

Stanford University / /

Technology

5.2 Michael Algorithm / LAN / WEP / appropriate Extensible Authentication Protocol / specific mutual authentication protocol / data confidentiality protocol / two data confidentiality protocols / protected data packets using data confidentiality protocols / wireless devices / encryption algorithm / MAC address / data integrity algorithm / block cipher / integrity protocols / RSNA algorithms / SSL / key management protocols / Michael algorithm / ICV algorithm / encryption / cryptography / mutual authentication protocol / higher layer protocols / WLAN / authentication protocols / Network Interface Card / Pre-RSNA algorithms / key scheduling algorithms / data confidentiality protocols / security algorithms / three data confidentiality protocols / Link Layer encryption algorithm / stream cipher / 802.11i protocol / /

SocialTag