Encrypted Key Exchange

5 Novembro 2015, 11:00 Miguel Filipe Leitão Pardal

EKE protocol for authentication using RSA and DH.

Review of RSA and DH principles and calculations.


Introduction to Wireless Networks Security.

WEP problems and attacks.