• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 8
  • 7
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 44
  • 24
  • 19
  • 18
  • 16
  • 12
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Analýza šifrovacích algoritmů ve standardu 802.11 / Analysis of Cryptographic Algorithms 802.11

Vojtíšek, Jindřich January 2014 (has links)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
12

The Cultural Programs of the WPA: with Special Emphasis on the Federal Art Project

Lashbrook, Lawrence G. 01 May 1971 (has links)
The number of Americans who did not suffer in some way from the depression of the thirties was small, indeed. This was a period of great travail for the United States and the entire world. However, it was also one of the most interesting and innovative periods in American history. President Franklin D. Roosevelt exhibited forceful and quick reactions to the economic and social problems besetting the nation. Not the least of these measures of mitigation was the Works Projects Administration and the inclusive WPA cultural projects. These projects contained an art program, a writers' program, a theatre program and a music program. The contributions of these programs were varied. A great deal of monetary value was produced by such respected Americans as Jackson Pollock, Mark Rothco, Stuart Davis, Richard Wright and Vardis Fisher. Monetary return did not comprise the major value or design of the programs. The first priority centered on providing useful employment to unemployed and creative citizens. This employment program was unique in that it strived to place the unemployed artist in a position in which he could use his artistic talent. The sculptor was not forced to dig ditches or lay pipe. He was given a job that utilized his true vocation, such as work on Mount Rushmore or sculptures for a children's playground, or even the instruction of sculpturing to an eager class of adults. This was probably where the real value of the program became patent. The artist was able to regain his self-respect and continue in his work. The state of Utah presented a useful example of the worth of WPA cultural programs. In a state as small and rural as Utah, a viable and workable program was effected. Therefore, it is reasonable to assume that if the cultural programs were of value to Utah, the significance to the larger states and the rest of the nation cannot easily be dismissed.
13

Internet of Things Security Using Proactive WPA/WPA2

Kamoona, Mustafa 05 April 2016 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.
14

Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS

Eklund Berggren, Oscar January 2020 (has links)
I en tid då datorer, mobiler och andra enheter som kan ansluta till ett WLAN är stor, kommer säkerheten i dessa WLAN spela en stor roll. Det som skiljer WLAN och LAN när det kommer till säkerheten är att informationen måste färdas trådlöst i luften, vilket kan medföra att obehöriga kan lyssna av eller försöka koppla upp sig mot det trådlösa nätverket. Valet och implementationen av kryptering av WLAN för SME och privatpersoner har en stor inverkan på säkerheten i ens WLAN. Hur enkelt är det för en obehörig person att ta sig in på ett WLAN? Denna undersökning testar WLAN som använder WEP, WPA/WPA2 PSK och WPS med hjälp av en brute force attack för att avgöra om krypteringprotokollen är lämpliga att använda sig av. Testet simuleras med en obehörig laptop som försöker ta sig in in WLAN med brute force på WLAN som använder WEP, WPA/WPA2 PSK och WPS. Program som aircrack-ng och airgeddon används för att utföra testerna.
15

Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning

Eriksson, Per, Wiklund, William, El-Hajj, Elie January 2010 (has links)
<p>Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:</p><p>- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?</p><p>- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?</p><p>- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?</p><p>Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.</p><p>Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.</p>
16

Security and Authentication for 802.11 Wireless Networks

Getraide, Michel 21 May 2004 (has links)
Wireless Networks is a very growing market. However, the security measures are not strong enough; the WEP security protocol is flawed. The 802.11 Task Group I is working on new security measures in order to strengthen the access control of users, the privacy and the integrity of data. We will describe the WEP flaws and the new security measures of 802.11 Task Group I. Finally, we will propose a new architecture to improve user identification for the wireless network of our department.
17

Digital Modeling and Non-Destructive Technological Examination of Artifacts and Safety Harbor Burial Practices at Picnic Mound 8Hi3, Hillsborough County, Florida

Mcleod, James Bart 26 March 2014 (has links)
This project reexamines field notes and artifacts from a Works Progress Administration excavation of the Picnic Mound (8Hi3), a Safety Harbor-period burial mound located in Hillsborough County, Florida. The goals are to reconstruct burial practices digitally using a Geographic Information Systems approach to test Ripley Bullen's model of Woodland and Safety Harbor burial practices, and demonstrate ways that modern technologies can be used to provide new information from past investigations. This thesis also presents new information from a pXRF study about prehistoric ceramic manufacturing in the Tampa Bay area, and discusses additional archaeological resources associated with the Picnic Mound. This thesis also illustrates new ways that archaeological materials can be analyzed and exhibited using three-dimensional laser scanning. Results from the GIS modeling show that burial practices were varied, and cannot be used to assign temporal placement to burial mounds within the Safety Harbor period, as proposed by Bullen. This research illustrates the value of returning to extant archaeological collections and field notes to test models of past human lifeways in a manner that is non-destructive. Information derived from the technologies used for my research can be shared digitally among researchers and can be used to develop materials for public education and furthers additional research efforts.
18

Made in America: The Federal Music Project in the Midwest

Renee D Gaarder (7467362) 17 October 2019 (has links)
<p>The 1930s to 1940s saw an upsurge in nationalism and the quest to define American identity. The federal government sponsored and sanctioned a specific nationalist narrative within the programs of the Works Progress Administration, later renamed Works Projects Administration. Very little attention has been paid to the Federal Music Project (FMP) yet this program was an integral part of constructing American identity both nationally and regionally. In conjunction with popular music, and at times in opposition to it, the FMP formed the “soundtrack” of American life. </p> <p>Although the messages were not as overt as those in other programs, such as the Federal Writers’ Project or Federal Theatre Project, the Federal Music Project played a large part in disseminating American ideals and identity, primarily through classical music, and to a lesser extent, popular, folk, and indigenous forms of music. The Federal Music Project strove to uncover, and at times create, America’s “genuine” musical heritage. The ideals of the New Deal took root in the musical expression of the FMP and impacted the development of American identity both musically and socially. It was not merely a relief program for those on its rolls; it was intended as an education program for the nation. Amid the push and pull of politics, war, and class conflict, American musicians forged and defined a unique style of music that was accepted by the American public.</p> The dissertation focuses on the FMP activities in the Midwest, or Region IV. Focusing on the Midwest as a region demonstrates how the FMP was interpreted and practiced and allows for a conversation with other the reginal studies of the FMP. Three case studies of Indiana, Illinois, and Michigan provide a more detailed analysis of the activities and contributions of each state, and thus the region, offering depth over breadth. Each of these states had dedicated and active symphonies, teaching projects, community outreach, radio broadcasting, and music therapy projects.
19

Snabb och säker roaming i WLAN / Fast and Secure Roaming in WLAN

Falk, Magnus January 2004 (has links)
<p>This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. </p><p>The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE. </p><p>Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i. </p><p>The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity. </p><p>This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.</p>
20

Untersuchung und Bewertung von Netzzugangssteuerungen auf Basis des Standards 802.1x (Port-Based Network Access Control)

Richter, Lars 11 March 2005 (has links) (PDF)
In der Arbeit wird der Standard 802.1x (Port-Based Network Access Control) näher betrachtet. Es werden die Funktionsweise und die Eigenschaften dieses Standards aufgezeigt. Weiterhin werden Hardware- und Softwareprodukte für die Nutzung des durch den Standard definierten Authentifizierungsverfahrens vorgestellt und analysiert. Abschließend erfolgt die Betrachtung für den Einsatz an der TU Chemnitz und der damit erfolgten Entwicklung einer Authenticator Komponenten.

Page generated in 0.0238 seconds