Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/34286
Full metadata record
DC FieldValueLanguage
dc.contributor.authorБакунова, О. М.-
dc.contributor.authorБакунов, А. М.-
dc.contributor.authorКотлов, А. А.-
dc.contributor.authorМартыненко, И. О.-
dc.contributor.authorГимик, В. О.-
dc.date.accessioned2019-01-24T11:09:57Z-
dc.date.available2019-01-24T11:09:57Z-
dc.date.issued2018-
dc.identifier.citationАтака с переустановкой ключа (krack) / О. М. Бакунова [и др.] // Web of Scholar. – 2018. - 6(24), Vol.1. - Pp. 38 – 39. - doi.org/10.31435/rsglobal_wos/12062018/5739.ru_RU
dc.identifier.urihttps://libeldoc.bsuir.by/handle/123456789/34286-
dc.description.abstractIn the era of IT great attention is paid to data security and confidentiality on the Internet. Despite that often vulnerabilities and exploits can be found in almost every system. Examples of such vulnerabilities can be a defect in architecture or an error in the data-transfer algorithm. Deprecation of standards can also lead to new exploits. As a result it is a necessary to develop new standards or modernize existing ones. This article is about new vulnerability in authorization process of Wi-Fi networks that make use of WPA2 protocol.ru_RU
dc.language.isoruru_RU
dc.publisherScientific Educational Center Warsawru_RU
dc.subjectпубликации ученыхru_RU
dc.subjectsecurity protocolsru_RU
dc.subjectnetwork securityru_RU
dc.subjectattacksru_RU
dc.subjectkey reinstallationru_RU
dc.subjectWPA2ru_RU
dc.titleАтака с переустановкой ключа (krack)ru_RU
dc.typeСтатьяru_RU
Appears in Collections:Публикации в зарубежных изданиях

Files in This Item:
File Description SizeFormat 
Bakunova_Ataka.PDF348.26 kBAdobe PDFView/Open
Show simple item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.