Back to Results
First PageMeta Content
IEEE 802.11 / Computing / Technology / Cyberwarfare / Wi-Fi Protected Access / Wi-Fi / Wireless security / Wired Equivalent Privacy / Temporal Key Integrity Protocol / Cryptographic protocols / Computer network security / Wireless networking


Annales Mathematicae et Informaticae[removed]pp. 45–55 http://ami.ektf.hu Performance evaluation of wireless networks speed depending on the
Add to Reading List

Document Date: 2013-12-20 14:05:43


Open Document

File Size: 495,98 KB

Share Result on Facebook

Company

Dell / AES / Introduction Wireless / AMD / /

Currency

pence / /

/

Facility

USB port / Dell studio / /

IndustryTerm

wireless clients / wireless standard / wireless a/b/g card / wireless network speed / windows7 x64 operating system router / media playback / Wireless networking / wireless settings / wireless security tools / usb wireless card / Wireless network security / temporary secure key protocol / internet subscriptions / wireless router / client-server networks / wr2543ND wireless router / wireless networks / wireless networking standards / security algorithm / /

Organization

European Union / János Sztrik Faculty of Informatics / European Social Fund / University of Debrecen / /

Technology

encryption / IPv6 / Temporal Key Integrity Protocol / WEP / RAM / wireless router / weaker encryption / temporary secure key protocol / data encryption / turion xl-50 processor / stronger encryption / TP-LINK WR2543nd router / 64 bit encryption / IPv4 / operating system / UDP / security algorithm / WPA/TKIP encryption / TP-LINK WR2543ND wireless router / windows7 x64 operating system router / wireless LAN / depending on the encryption / tested using a modern wireless router / /

URL

http /

SocialTag