Back to Results
First PageMeta Content
IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security


Intercepting Mobile Communications: The Insecurity of[removed]  
Add to Reading List

Document Date: 2001-08-01 17:50:14


Open Document

File Size: 98,92 KB

Share Result on Facebook

City

San Francisco / Santa Barbara / San Jose / Doubleday / New York / /

Company

RSA Data Security Inc. / C. John Wiley and Sons Inc. / Lucent / ACM Press / Microsoft / /

Country

United States / /

/

Facility

University of Waterloo / /

IndustryTerm

wireless installation / secure protocols / Internet host / wireless systems / Internet connectivity / mobile communications security protocols / wireless link / wireless transmissions / Internet Request / http /

Movie

Mary / Queen of Scots / /

Organization

US Government / UC Berkeley / USENIX Association / Internet Engineering Task Force / University of Waterloo / IEEE Computer Society / /

Person

Anthony Joseph / Mike Chen / Adam Shostack / Bernard Aboba / Matt Welsh / Ian Goldberg / Jesse Walker / Alec Woo / David Wagner / Mary / Nikita Borisov Ian Goldberg / /

Position

driver / editor / Queen / network administrator / security researcher / protocol designer / /

Product

Orinoco cards / Message Injection / Orinoco / /

ProvinceOrState

New York / South Carolina / California / /

PublishedMedium

IEEE Communications Magazine / /

Technology

RC4 algorithm / Point-to-Point Tunneling Protocol / encryption algorithm / IP protocols / alleged RC4 algorithm / secret key / Encryption / cryptography / 3.0 protocol / RC4 encryption algorithm / wireless access / WEP protocol / 802.11 protocol / 2.1 Security Goals The WEP protocol / PDA / IP security protocols / authentication protocol / engineering network protocols / WEP / control network / PPTP protocol / IP Security protocol / IP / IP router / link-layer protocol / WEP PROTOCOL The Wired Equivalent Privacy protocol / VPN / cryptographic protocol / wireless technology / SSL / operating systems / TCP/IP / Ethernet / security protocol / MESSAGE AUTHENTICATION The WEP protocol / firewall / mobile communications security protocols / Mobile Computing / wireless LAN / stream cipher / encrypted using a stream cipher / /

URL

http /

SocialTag