Essays about: "wireless authentication"

Showing result 21 - 25 of 37 essays containing the words wireless authentication.

  1. 21. Security issues with Mobile IP

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Abdel Rahman Alkhawaja; Hatem Sheibani; [2011]
    Keywords : Mobile IP;

    Abstract : With a rapid growth in wireless technology in recent years, Mobile IP has become very important for consumers and businesses by providing mobility based on IP addresses using several applications, which keep the employees connected with each others with critical information. In mobile IP the node can change its location by maintaining the same IP address and keep connected to the internet, which solves the issue of terminating the communication once it moves. READ MORE

  2. 22. Wireless LAN Deployment, Single-Sign-On with Novell eDirectory, Laholms kommun.

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Omafume Enakeyarhe; [2011]
    Keywords : ;

    Abstract :  The effectiveness of Wireless LAN is of no doubt unquestionable, primarily satisfying mobility purposes but when it relates to specific cases in relation to type of network infrastructure utilized by an organization, questions on positive deployment arises. With Novell eDirectory and client as database platform, direct 802. READ MORE

  3. 23. Secure Identification in Social Wireless Networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Omer Nawaz; [2011]
    Keywords : Secure Identification; Internet Security; GBA; UICC;

    Abstract : The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. READ MORE

  4. 24. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Stephen Ekhator; [2010]
    Keywords : data; traffic; exploit; kismet; netsh;

    Abstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE

  5. 25. A New Authenticator

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Jia Guo; [2010]
    Keywords : ;

    Abstract : This thesis is part of a larger project on non-binary alternatives to authentication; in contrast to the binary authentication used in IEEE 802.1X and IEEE 802.11i. This thesis project seeks to define, implement, and evaluate a non-binary wireless access authentication mechanism. READ MORE