Back to Results
First PageMeta Content
IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security


Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov
Add to Reading List

Document Date: 2001-10-23 20:39:38


Open Document

File Size: 177,27 KB

Share Result on Facebook

City

San Francisco / Santa Barbara / Reading / San Jose / Doubleday / New York / Rome / /

Company

RSA Data Security Inc. / C. John Wiley and Sons Inc. / Lucent / ACM Press / Microsoft / /

Country

Italy / United States / /

Currency

USD / /

/

Facility

University of Waterloo / /

IndustryTerm

wireless installation / secure protocols / Internet host / wireless systems / Internet connectivity / mobile communications security protocols / wireless link / wireless transmissions / Internet Request / http /

Movie

Mary / Queen of Scots / /

Organization

US Government / UC Berkeley / USENIX Association / Internet Engineering Task Force / University of Waterloo / IEEE Computer Society / /

Person

Anthony Joseph / Mike Chen / David Wagner Ian Goldberg / Adam Shostack / Bernard Aboba / Matt Welsh / Ian Goldberg / Jesse Walker / Alec Woo / Mary / Nikita Borisov / /

Position

driver / editor / Queen / network administrator / security researcher / protocol designer / /

Product

Orinoco cards / Message Injection / Orinoco / /

ProvinceOrState

New York / South Carolina / California / /

PublishedMedium

IEEE Communications Magazine / /

Technology

RC4 algorithm / Point-to-Point Tunneling Protocol / encryption algorithm / IP protocols / alleged RC4 algorithm / secret key / Encryption / cryptography / 3.0 protocol / RC4 encryption algorithm / wireless access / WEP protocol / 802.11 protocol / 2.1 Security Goals The WEP protocol / PDA / The WEP protocol / IP security protocols / authentication protocol / engineering network protocols / WEP / control network / PPTP protocol / IP Security protocol / IP / IP router / link-layer protocol / WEP PROTOCOL The Wired Equivalent Privacy protocol / VPN / cryptographic protocol / wireless technology / SSL / operating systems / TCP/IP / Ethernet / security protocol / firewall / mobile communications security protocols / wireless LAN / stream cipher / encrypted using a stream cipher / /

URL

http /

SocialTag