Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2002, Vol. 19 ›› Issue (3): 334-341.DOI: 10.7523/j.issn.2095-6134.2002.3.016

Previous Articles    

Key Technologies in Securities of Wireless Electric Business

LU Pei-Zhong1, PING Hu2   

  1. 1. Institute of Mathematics, Fudan University, Shanghai 200433;
    2. Department of Automatics, Dong Hua University, Shanghai 200335
  • Received:2002-06-18 Online:2002-05-18

Abstract:

This paper firstly presents a briefly survey on the security technologies in wireless communications Then we focus on some important protocols which will be used in WPKI algorithm in IEEE 802 Protocol(WAP).We.11 and the Wireless Transport Layer Security ( W'I'LS) inespecially the WEP Wireless Application study realizations of these two protocols, compare their security features, and discuss their potential advances in applications.

Key words: wireless LAN, wired equivalent privacy(WEP), wireless transport layer security(WTLS)

CLC Number: