Main content

Bibliographic data

Document DE102005050584B4 (Pages: 16)

Bibliographic data Document DE102005050584B4 (Pages: 16)
INID Criterion Field Contents
54 Title TI [DE] Verfahren zum Ermitteln eines unerwünschten Zugriffs auf ein Datenpaket
71/73 Applicant/owner PA Will, Lucas, 14482 Potsdam, DE
72 Inventor IN Roschke, Sebastian, 14482 Potsdam, DE ; Will, Lucas, 14482 Potsdam, DE
22/96 Application date AD Oct 21, 2005
21 Application number AN 102005050584
Country of application AC DE
Publication date PUB Apr 30, 2009
33
31
32
Priority data PRC
PRN
PRD


51 IPC main class ICM H04L 12/56 (2006.01)
51 IPC secondary class ICS H04L 12/26 (2006.01)
IPC additional class ICA
IPC index class ICI
Cooperative patent classification CPC H04L 63/1416
H04L 63/1441
H04L 63/1466
MCD main class MCM H04L 12/56 (2006.01)
MCD secondary class MCS H04L 12/26 (2006.01)
MCD additional class MCA
57 Abstract AB
56 Cited documents identified in the search CT US020020031134A1
US020020073338A1
US020030145232A1
US020050022020A1
56 Cited documents indicated by the applicant CT
56 Cited non-patent literature identified in the search CTNP GODBER,Austin, DASGUPTA,Partha: Countering Rogues in Wireless Networks. IEEE, Proceedings of the ICPPW'03, 2003; SUGENG, Hubert 0;
GODBER,Austin, DASGUPTA,Partha: Countering Rogues in Wireless Networks. IEEE, Proceedings of the ICPPW'03, 2003 n;
POOL, Jesse: Man-in-the-Middle: Vulnerabilities in Public-key/SSH Carleton,University, April 2005 0;
SUGENG, Hubert, POOL, Jesse: Man-in-the-Middle: Vulnerabilities in Public-key/SSH .Carleton,University, April 2005 n
56 Cited non-patent literature indicated by the applicant CTNP
Citing documents Determine documents
Sequence listings
Search file IPC ICP H04L 12/26