Back to Results
First PageMeta Content
Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing


YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland
Add to Reading List

Document Date: 2001-08-11 18:26:34


Open Document

File Size: 323,39 KB

Share Result on Facebook

Company

Lucent / /

Facility

Computer Science University of Maryland College Park / /

IndustryTerm

early Internet connections / local area network / wireless clients / wireless standard / appropriate network / organizations deploying wireless networks / wireless card / wireless cards / Wireless Network / default authentication protocol / deployed wireless access points / wireless protocol / wireless client finding / wireless infrastructures / internal infrastructure / wireless stations / Internet firewall / operational wireless networks / deployed wireless network access points / deployed wireless networks / wireless networks / wireless access points / ad-hoc network / internal network / /

OperatingSystem

Macintosh / /

Organization

No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department / University of Maryland College Park / /

Person

William A. Arbaugh / William A. Arbaugh Narendar Shankar / Narendar Shankar / Y.C.Justin Wan / Shankar Y.C. Justin Wan / /

Position

Walker / network manager / /

ProvinceOrState

Maryland / /

Technology

encryption / ethernet / default authentication protocol / LAN / WEP / wireless protocol / wireless access / firewall / MAC address / 3.1 Wired Equivalent Privacy protocol / secret key / 6 6 Source Addr BSSID Algorithm / /

SocialTag