Nothing Special   »   [go: up one dir, main page]

Nguyen, 2018 - Google Patents

Wireless Network Security: A Guide for Small and Medium Premises

Nguyen, 2018

View PDF
Document ID
5309007086931819826
Author
Nguyen H
Publication year

External Links

Snippet

The 21th Century is defined by human scientific breakthroughs. One of them is the global use of the Internet. Almost every educated person nowadays knows more or less about the internet. Thereby, a large percentage of the human population make use of the internet on a …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Karygiannis et al. Wireless Network Security:.
Kumar et al. A literature review of security threats to wireless networks
Hole et al. Securing wi-fi networks
Zahur et al. Wireless LAN security and laboratory designs
Erten et al. A layered security architecture for corporate 802.11 wireless networks
Welch et al. A survey of 802.11 a wireless security threats and security mechanisms
Arana Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)
Suroto WLAN security: threats and countermeasures
Guo Survey on WiFi infrastructure attacks
Singh et al. Analysis of security issues and their solutions in wireless LAN
Ajah Evaluation of enhanced security solutions in 802.11-based networks
Sharma et al. A review on wireless network security
Korolkov et al. Analysis of attacks in IEEE 802.11 networks at different levels of OSI model
Li et al. Encryption as an effective tool in reducing wireless LAN vulnerabilities
Nguyen Wireless Network Security: A Guide for Small and Medium Premises
Lei et al. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN
Teyou et al. Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI)
Sakib et al. Security improvement of WPA 2 (Wi-Fi protected access 2)
Pandikumar et al. Wi-Fi security and test bed implementation for WEP and WPA cracking
Issac et al. War driving and WLAN security issues—attacks, security design and remedies
Srinivasan et al. VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins
Pervaiz et al. Security in wireless local area networks
Kutsak ANALYSIS OF ATTACKS IN IEEE 802.11 NETWORKS AT DIFFERENT LEVELS OF OSI MODEL.
Chakraborty et al. An Extensive Review of Wireless Local Area Network Security Standards
MOdeL INFORMATION TECHNOLOGIES, SYSTEMS ANALYSIS AND ADMINISTRATION