Nguyen, 2018 - Google Patents
Wireless Network Security: A Guide for Small and Medium PremisesNguyen, 2018
View PDF- Document ID
- 5309007086931819826
- Author
- Nguyen H
- Publication year
External Links
Snippet
The 21th Century is defined by human scientific breakthroughs. One of them is the global use of the Internet. Almost every educated person nowadays knows more or less about the internet. Thereby, a large percentage of the human population make use of the internet on a …
- 238000004891 communication 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Kumar et al. | A literature review of security threats to wireless networks | |
Hole et al. | Securing wi-fi networks | |
Zahur et al. | Wireless LAN security and laboratory designs | |
Erten et al. | A layered security architecture for corporate 802.11 wireless networks | |
Welch et al. | A survey of 802.11 a wireless security threats and security mechanisms | |
Arana | Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2) | |
Suroto | WLAN security: threats and countermeasures | |
Guo | Survey on WiFi infrastructure attacks | |
Singh et al. | Analysis of security issues and their solutions in wireless LAN | |
Ajah | Evaluation of enhanced security solutions in 802.11-based networks | |
Sharma et al. | A review on wireless network security | |
Korolkov et al. | Analysis of attacks in IEEE 802.11 networks at different levels of OSI model | |
Li et al. | Encryption as an effective tool in reducing wireless LAN vulnerabilities | |
Nguyen | Wireless Network Security: A Guide for Small and Medium Premises | |
Lei et al. | Comparative studies on authentication and key exchange methods for 802.11 wireless LAN | |
Teyou et al. | Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI) | |
Sakib et al. | Security improvement of WPA 2 (Wi-Fi protected access 2) | |
Pandikumar et al. | Wi-Fi security and test bed implementation for WEP and WPA cracking | |
Issac et al. | War driving and WLAN security issues—attacks, security design and remedies | |
Srinivasan et al. | VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins | |
Pervaiz et al. | Security in wireless local area networks | |
Kutsak | ANALYSIS OF ATTACKS IN IEEE 802.11 NETWORKS AT DIFFERENT LEVELS OF OSI MODEL. | |
Chakraborty et al. | An Extensive Review of Wireless Local Area Network Security Standards | |
MOdeL | INFORMATION TECHNOLOGIES, SYSTEMS ANALYSIS AND ADMINISTRATION |