A standard developed by the IEEE that enables authentication and key management for IEEE 802 local area networks.
Limiting the flow of information from the resources of a system only to authorized persons, programs, processes, or other systems in a network.
In the context of wireless networking, it is a device that coordinates the wireless clients' use of wired resources.
Holding people responsible for their actions.
The methods by which one can establish who or what performed a certain action, such as tracking a user's data connection and logging system users.
A NIST–endorsed encryption standard in replacement of DES. It uses the Rijndael ...