Building and Breaking Wireless Security
In this webcast, the presenter gives an overview on state-of-the-art wireless security concepts: how can the users' analyze wireless protocols? How can they build mechanisms that are secure even when the attacker has unlimited computational power? Can they exploit wireless transmission for more? Typically, wireless security is realized by implementing encryption on upper layers and replacing the wire with some wireless modulation schemes.