Back to Results
First PageMeta Content
Computing / Wireless / Cryptographic protocols / Wi-Fi / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wireless networking / Technology / Computer network security


Privacy-Preserving[removed]Access-Point Discovery Janne Lindqvist∗§ Tuomas Aura‡∗ George Danezis‡ Teemu Koponen† Annu Myllyniemi∗ Jussi Mäki∗ Michael Roe‡ ABSTRACT It is usual for[removed]WLAN clients to
Add to Reading List

Document Date: 2011-09-14 15:06:11


Open Document

File Size: 400,54 KB

Share Result on Facebook

City

Zurich / Cambridge / /

Company

Probe Response / Computer-Communication Networks / Beacon / Gower Publishing / Nike / Cisco Press / Meraki Inc. / Microsoft / /

Country

Switzerland / United Kingdom / /

Currency

USD / /

/

EntertainmentAwardEvent

Jussi / /

Event

FDA Phase / /

Facility

hospital WLAN / Helsinki University of Technology / Rutgers University / Finland Helsinki Institute / /

IndustryTerm

privacy-preserving protocol / managed enterprise networks / authenticated keyexchange protocol / hospital network / legacy networks / Web browser / privacy solution / real time / coffeeshop network / raw processing times / correct network / the new and old protocol / card manufacturer / wireless privacy / particular device / link-layer network discovery protocol / wireless networking standards / securely-hidden networks / cryptographic discovery protocol / wireless interface / higher level privacy protocols / honest networks / communications cost / hidden-network discovery protocol / wireless fingerprinting / access network / Wireless Card / Wireless Operational Security / access point discovery protocol / network association protocol / personal wireless device / Information technology / challenge-response protocol / configuration tools / active discovery protocol / Internet-Draft / authentication protocol / Wireless communication General Terms Security / stand-alone protocol / wireless clients / authentication server / local extremist / security protocol / probe processing times / wireless network / recognized networks / identifier-free link layer protocol / anonymous communications / hidden networks / extensible authentication protocol / nonhidden networks / wireless operators / visited networks / higherlevel protocols / virtual local area networks / hidden network / legacy operating systems / wireless-network security / wireless networks / remote network / foreign government network / privacy-preserving accesspoint discovery protocol / access-point discovery protocol / wireless cards / securely-hidden network / non-hidden networks / wireless networking / network discovery protocol / client device / access-point software / command line tool / network operator / password-based authentication protocols / Wireless LANs / network-discovery protocol / Wireless Environment / public networks / discovery protocol / Wireless Devices / /

OperatingSystem

Windows Vista / Windows XP / Linux / /

Organization

Wifi Alliance / Control Association / Rutgers University / Electronic Society / AP / Helsinki University of Technology / Finland Helsinki Institute for Information Technology / Response SSID / /

Person

P. Tabriz / V / Michael Roe / STA AP / George Danezis‡ Teemu Koponen / /

Position

Wireless Device Driver / Wireless communication General / Corresponding author / /

Product

Franklin / OpenWrt / Linux / WPA2 / Our solution / our / /

TVStation

WSRE / /

Technology

challenge-response protocol / RAM / Privacy-preserving access-point discovery protocol / Linux / Information Technology / stand-alone protocol / identifier-free link layer protocol / authenticated keyexchange protocol / privacy-preserving protocol / Security Protocols / secret key / operating system / higherlevel protocols / Quality of Service / encryption / cryptography / 802.11 2-round active discovery protocol / wireless device / higher level privacy protocols / discovery protocol / Key provisioning The protocol / Bluetooth / proposed protocol / authentication protocol / 1 GHz VIA C3 processor / 802.11 MAC protocol / link-layer network discovery protocol / Wireless Devices / MAC address / System-on-a-Chip / 802.11 access point discovery protocol / WPA-PSK security protocol / 802.11 network discovery protocol / network discovery protocol / operating systems / password-based authentication protocols / resistant broadcast encryption / EAP Protocol / WLAN protocols / public key / Identification The protocol / WLAN / cryptographic discovery protocol / extensible authentication protocol / hidden-network discovery protocol / privacy-preserving accesspoint discovery protocol / 4 Privacy-Preserving AP Discovery Protocol / access-point discovery protocol / SSID-hiding network-discovery protocol / local area networks / VOIP / 802.11 network association protocol / wireless LAN / /

URL

http /

SocialTag