Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Wi-Fi Protected Setup

Known as: QSS (Wi-Fi), Wifi Protected Setup, Quick Security Setup 
Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a network security standard to create a secure wireless home network. The PIN method… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Developed in the mid-2000s by the Wi-Fi Alliance, the Wi-Fi Protected (WPS) protocol assists configuration of mobile and wireless… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2013
2013
The invention discloses a WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device… Expand
Is this relevant?
2012
2012
 
Is this relevant?
2012
2012
Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gallande hur autentiseringen av den PIN-kod… Expand
Is this relevant?
2012
2012
Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2010
2010
The embodiment of the invention discloses a method and a device for performing negotiation according to a Wi-Fi protected setup… Expand
Is this relevant?
2008
2008
为了即使在自组织模式下也容易且有效地提供通信参数,提供通信参数的装置向通知信号添加特定的附加信息并且发送该通知信号。 接收到该通知信号的装置在发送通知信号时也添加相同的附加信息。 要接收通信参数的装置请求从所接收到的信息中所指示的装置提供通信参数。 
Is this relevant?
2008
2008
Deploying large-scale wireless citywide networks with strong authentication mechanisms has received considerable interest in… Expand
Is this relevant?
2007
2007
Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?