Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Hi-index | 0.00 |
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communication is a pre-condition for using a WLAN for confidential contents. Many existing solutions either do not provide the neccessary security or fail when employed with large user bases. The IPSec based solution developed at the Faculty of Applied Science of the University of Freiburg provides a high level of security, and by using digital X.509 certificates the problem of administrating a large user base is solved as well.