文件名称:jen_hall
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
The need for robust access control mechanisms is paramount, especially in Wireless
Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current
authentication systems are vulnerable to device impersonation by rogue devices.
Within cellular mobile networks, this threat is actualized by cloning cell phones,
and using the clones for obtaining free services. A well known example in Wireless
Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing.
In this case, an attacker captures the MAC address of an authorized device and
programs it into his device, in order to obtain unauthorized access. The threat of
address spoofing is equally applicable to Bluetooth (BT) ad-hoc networks.
Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current
authentication systems are vulnerable to device impersonation by rogue devices.
Within cellular mobile networks, this threat is actualized by cloning cell phones,
and using the clones for obtaining free services. A well known example in Wireless
Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing.
In this case, an attacker captures the MAC address of an authorized device and
programs it into his device, in order to obtain unauthorized access. The threat of
address spoofing is equally applicable to Bluetooth (BT) ad-hoc networks.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
jen_hall.pdf