Back to Results
First PageMeta Content
Wireless networking / IEEE 802.11 / Advanced Encryption Standard / RC4 / Wired Equivalent Privacy / IEEE 802.11i-2004 / Public-key cryptography / Symmetric-key algorithm / Temporal Key Integrity Protocol / Cryptography / Cryptographic protocols / Computer network security


Document Date: 2006-02-19 14:19:02


Open Document

File Size: 340,97 KB

Share Result on Facebook

City

Toronto / San Jose / Athens / San Diego / /

Company

CRC Press / the AES / John Wiley & Sons Inc. / Assessing Security-Critical Energy-Efficient Sensor Networks / Las Vegas NV / Power-Conscious Systems / Information Exchange Between Systems / IEEE / Intel / /

Country

Canada / United States / Greece / /

Currency

USD / pence / /

/

Event

FDA Phase / /

Facility

P. Krishnamurthy Telecommunications Program University of Pittsburgh Pittsburgh / Prentice Hall / /

IndustryTerm

486DX2 processor / Wireless Medium Access Control / Web Based Tool / Wireless Information Architecture / energy efficient security protocols / wireless link / ad hoc networking environment / energy / energy efficient communications protocols / energy consumption / sensor networks / Wireless Sessions / energy efficient communication protocols / wireless device / energy consumption benchmark / less energy / energy efficiency / wireless sniffer / wireless transmission / security protocols / light encryption algorithm / compression algorithm / handheld device / energy efficient technique / symmetric key algorithms / Wireless Clients / wireless channel errors / low processing power / Wireless Devices Many encryption algorithms / Wireless LAN Medium Access Control / transmission protocols / congestion control algorithm / wireless networks / hybrid security protocol / times less energy / communications protocols / energy cost / wireless network interface / security services / energy efficient security scheme / encryption algorithms / wireless local area networks / wireless handheld devices / Wireless LANs / large communication networks / encryption algorithm / wireless devices / Wireless Transport Layer Security / /

Organization

Wireless LANs P. Prasithsangaree and P. Krishnamurthy Telecommunications Program University of Pittsburgh Pittsburgh / International Criminal Court / /

Person

Joan Daemen / Ron Rivest / Vincent Rijmen / /

/

Product

RC4 / /

ProgrammingLanguage

Joule / /

ProvinceOrState

California / /

PublishedMedium

Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

symmetric key encryption / TCP protocol / RC4 algorithm / RAM / asymmetric key encryption / Encryption algorithms / encryption algorithm / communications protocols / two symmetric key algorithms / smart card / security protocols / I. INTRODUCTION Encryption algorithms / transmission protocols / BACKGROUND AND RELATED WORK A. Encryption / public key encryption / encryption / Cryptography / congestion control algorithm / RC4 algorithms / compression algorithm / wireless device / WEP protocol / light encryption algorithm / secret key encryption / 486DX2 processor / LAN / WEP / 802.11 MAC protocol / wireless devices / 300 A. Encryption / MTU / hybrid security protocol / SSL / key Blowfish algorithm / key scheduling algorithm / SSL protocol / communication protocols / local area networks / embedded processor / wireless LAN / /

URL

http /

SocialTag