Back to Results
First PageMeta Content
IEEE 802.11 / Computer network security / Secure communication / Temporal Key Integrity Protocol / Wired Equivalent Privacy / IEEE 802.11i-2004 / Wireless security / CCMP / RC4 / Cryptography / Cryptographic protocols / Wireless networking


Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and
Add to Reading List

Document Date: 2013-04-08 13:37:51


Open Document

File Size: 96,54 KB

Share Result on Facebook

City

San Jose / /

Company

Vigil CCMP / Cisco Systems / Intel Corporation / IEEE 802 / CCMP / the AES / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

National Institute of Standards and Technology / The station / FIPS Pub / University of California at Berkeley / /

IndustryTerm

wireless integrity / mobile communications / wireless network / Wireless Equivalent Privacy / authentication infrastructure / protocols / offthe-shelf hardware / financial applications / released tools / software-accessible storage / selected well-regarded algorithms / wireless local area network / proper equipment / interim solution / elegant solution / user authentication protocol / cryptographic algorithms / long-term solution / i486 processor / metropolitan area networks / schedule algorithm / encryption algorithm / security protocols / /

Organization

University of California / Wireless LAN association / National Institute of Standards and Technology / CCM MIC / /

Person

Michael Key / Jesse Walker / Michael Plaintext / Nancy Cam-Winget / David Wagner / Russ Housley / /

Position

driver / security architect / editor / walker / technical leader / founder / assistant professor / /

Product

CCMP / WEP patch / /

ProvinceOrState

California / /

PublishedMedium

COMMUNICATIONS OF THE ACM / /

Technology

LAN / WEP / WEP encryption / i486 processor / MAC address / Block Cipher / user authentication protocol / using RC4 encryption / security protocols / WLAN security protocols / 104-bit 128-bit encryption / ARM7 processor / key management protocol / 802.11 DATA LINK PROTOCOLS / 128-bit encryption / encryption / MIC algorithm / cryptography / key schedule algorithm / RC4 encryption algorithm / Both algorithms / WLAN / Mobile Computing / WEP protocol / selected well-regarded algorithms / Wireless LAN / stream cipher / /

SocialTag