Back to Results
First PageMeta Content
IEEE 802.11 / Computer network security / Secure communication / Temporal Key Integrity Protocol / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wired Equivalent Privacy / Aircrack-ng / Related-key attack / Cryptography / Cryptographic protocols / Wireless networking


asia29c-vanhoef.dvi
Add to Reading List

Document Date: 2013-04-09 10:42:32


Open Document

File Size: 213,47 KB

Share Result on Facebook

City

Hangzhou / /

Company

Cisco Aironet 1130 AG / Computer-Communication Networks / ComputerCommunication Networks / VDSL Box Both TKIP Cisco Aironet 1130 AG / Intel / WEP’s co / /

Country

China / /

Currency

USD / /

/

IndustryTerm

encrypted networks / Wireless communication General Terms Security / Open source router / requested protocols / encountered wireless adapters / improvements to our tool / wireless network / wireless adapters / different wireless adapters / much devices / intermediate protocol / encryption protocol / Wireless Communications / Wireless networks security / particular device / internet connection / concept tool / Wireless LAN / few additional networks / wireless networks / basic security algorithm / equivalent privacy protocol / Wireless routers / identified networks / compat-wireless drivers / Wireless drivers / Wireless network security / intermediary solution / wireless transmission special care / open source wireless router / prediction algorithm / wireless network usage / wireless devices / wireless traffic / patching the compat-wireless drivers / /

OperatingSystem

Mac OS X / Linux / Android / DoS / Microsoft Windows / /

Organization

MIC ICV / WiFi Alliance / European Union / MAC Service Data Unit / Research Foundation / /

Person

Frank Piessens / /

Position

driver / Wireless communication General / original driver / General / patched driver / /

Product

iPad / iPod / /

Technology

open source wireless router / TEMPORAL KEY INTEGRITY PROTOCOL / WEP / networks using encryption / requested protocols / inverse Michael algorithm / wireless devices / Linux / Belkin N300 router / TKIP protocol / MAC address / prediction algorithm / intermediate protocol / secret key / Android / UDP / Quality of Service / operating systems / TCP/IP / Wi-Fi / Michael algorithm / pdf / Mobile Devices / Encryption / Open Source router / Cryptography / VDSL / key scheduling algorithm / reverse Michael algorithm / Mobile Computing / equivalent privacy protocol / ISP / encryption protocol / snp / IPv4 / Wireless routers / basic security algorithm / 802.11 protocol / weak Michael algorithm / Wireless LAN / stream cipher / /

URL

http /

SocialTag