Results 1 - 10
of
41,070
Table 5: Expressions for the primary key problem
Table 4: Kernel IS on native PVM
Table 8: Kernel CG on enhanced PVM
Table 3-2. Key Problems with Existing 802.11 Wireless LAN Security
2002
"... In PAGE 8: ...v List of Tables Table3 -1.... In PAGE 8: ...able 3-1. Key Characteristics of 802.11 Wireless LANs ....................................................... 3-8 Table3 -2.... In PAGE 8: ...able 3-2. Key Problems with Existing 802.11 Wireless LAN Security ................................. 3-18 Table3 -3.... In PAGE 8: ...able 3-3. Wireless LAN Security Checklist ......................................................................... 3-40 Table3 -4.... In PAGE 24: ...02.11 standard. As an introduction to the 802.11 and WLAN technology, Table3 -1 provides some key characteristics at a glance. Table 3-1.... In PAGE 24: ...02.11 standard. As an introduction to the 802.11 and WLAN technology, Table 3-1 provides some key characteristics at a glance. Table3 -1. Key Characteristics of 802.... In PAGE 56: ...3-40 3.8 Wireless LAN Security Checklist Table3 -3 provides a WLAN security checklist. The table presents guidelines and recommendations for creating and maintaining a secure 802.... In PAGE 56: ... For instance, an individual performing a wireless security audit in an 802.11 environment can quickly check off each recommendation for the agency, asking Have I done this? Table3 -3. Wireless LAN Security Checklist Checklist Security Recommendation Best Practice Should Consider Status Management Recommendations 1.... In PAGE 58: ... ! 3.9 Wireless LAN Risk and Security Summary Table3 -4 lists security recommendations for 802.11 wireless LANs.... In PAGE 59: ...3-43 Table3 -4. Wireless LAN Security Summary Security Recommendation Security Needs, Requirements, or Justification 1.... ..."
Table 5. Problems and rationale of the key stakeholder roles
1994
Cited by 2
Table 5. Problems and rationale of the key stakeholder roles
1994
Cited by 2
Table 1. A comparison of public-key cryptosystems [30]. Public-key system Examples Mathematical Problem Best known method for
"... In PAGE 2: ... The relative difficulty of solving that problem de- termines the security strength of the corresponding system. Table1 summarizes three types of well known public-key cryptosystems. As shown in the last column, RSA, Diffie- Hellman and DSA can all be attacked using sub-exponential algorithms, but the best known attack on ECC requires ex- ponential time.... ..."
Table 20.4 Key Parameters used to Solve the List Problem. Other parameters are as [Koza 1994, page 655]
1996
Cited by 29
Table 20.4 Key Parameters used to Solve the List Problem. Other parameters are as [Koza 1994, page 655]
Results 1 - 10
of
41,070