Wireless network security analysis
Various security features such as authentication, access control, confidentiality, integrity and non-repudiation and network security mechanisms that include encipherment, digital signature, access control and data integrity are required. Network security methods and technologies are also discussed....
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/4055 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
id |
sg-ntu-dr.10356-4055 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-40552023-07-04T15:15:23Z Wireless network security analysis Zhou, Gang. School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Various security features such as authentication, access control, confidentiality, integrity and non-repudiation and network security mechanisms that include encipherment, digital signature, access control and data integrity are required. Network security methods and technologies are also discussed. Security flaws and some of the known attacking methods are revealed. Master of Science (Communication and Network Systems) 2008-09-17T09:43:18Z 2008-09-17T09:43:18Z 2002 2002 Thesis http://hdl.handle.net/10356/4055 Nanyang Technological University application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Zhou, Gang. Wireless network security analysis |
description |
Various security features such as authentication, access control, confidentiality, integrity and non-repudiation and network security mechanisms that include encipherment, digital signature, access control and data integrity are required. Network security methods and technologies are also discussed. Security flaws and some of the known attacking methods are revealed. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Zhou, Gang. |
format |
Theses and Dissertations |
author |
Zhou, Gang. |
author_sort |
Zhou, Gang. |
title |
Wireless network security analysis |
title_short |
Wireless network security analysis |
title_full |
Wireless network security analysis |
title_fullStr |
Wireless network security analysis |
title_full_unstemmed |
Wireless network security analysis |
title_sort |
wireless network security analysis |
publishDate |
2008 |
url |
http://hdl.handle.net/10356/4055 |
_version_ |
1772829008855040000 |