يعرض 1 - 20 نتائج من 69 نتيجة بحث عن '"Wi-Fi security"', وقت الاستعلام: 0.73s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Academic Journal
  4. 4
    Conference

    المساهمون: Technische Universität Munchen - Technical University Munich - Université Technique de Munich (TUM), Pennsylvania State University (Penn State), Penn State System, Nathan Clarke, Steven Furnell, TC 11, WG 11.12

    المصدر: IFIP Advances in Information and Communication Technology ; 14th International Symposium on Human Aspects of Information Security and Assurance (HAISA) ; https://inria.hal.science/hal-03657727 ; 14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.233-243, ⟨10.1007/978-3-030-57404-8_18⟩

    جغرافية الموضوع: Mytilene, Lesbos, Greece

  5. 5
    Academic Journal

    المؤلفون: Byoungcheon Lee

    المصدر: Electronics; Volume 10; Issue 2; Pages: 215

    وصف الملف: application/pdf

    Relation: Microwave and Wireless Communications; https://dx.doi.org/10.3390/electronics10020215

  6. 6
    Dissertation/ Thesis
  7. 7
    Academic Journal
  8. 8
  9. 9
    Report
  10. 10
  11. 11
  12. 12
    Academic Journal
  13. 13
    Dissertation/ Thesis
  14. 14
    Academic Journal

    المؤلفون: Boretskyy, Taras

    المساهمون: Lviv Polytechnic National University

    جغرافية الموضوع: Львів

    وصف الملف: 1-6; application/pdf; image/png

    Relation: Advances in Cyber-Physical Systems : scientific journal, 1 (4), 2019; http://www.aircrack-ng.org/; http://csrc.nist.gov/; http://www.haveibeenpwned.com/; http://www.3wifi.stascorp.com/; 1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.; 2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16.; 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].; 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.; 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]; 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.; 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].; 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].; 1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.; 2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16.; Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.; https://ena.lpnu.ua/handle/ntb/45644; Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.

  15. 15
  16. 16
  17. 17
    Academic Journal
  18. 18
    Academic Journal
  19. 19
  20. 20
    Academic Journal