Verschlüsselungstechnologien |
WEP, WPA, WPA2, WPS
|
WEP | WPA | WPA2 | WPA3
|
WPS, WPA2, WPA, WEP, WPA3
|
WEP, WPA, WPA2, WPA3, WPS
|
WEP, WPA, WPA2, WPS, WPA3
|
WPA2, WPA3
|
WEP, WPA, WPA2, WPA3, WPS
|
128-bit WEP | 152-bit WEP | 64-bit WEP | WPA-PSK | WPA2-PSK
|
64-bit WEP |128-bit WEP |WPA-PSK |WPA2-PSK
|
WPA2, WPA3
|
-
|
-
|
WEP, WPA, WPA2, WPA3, WPS
|
WPS, WPA, WPA2, WEP, WPA3
|
64-bit WEP,128-bit WEP,WPA-PSK,WPA2-PSK
|
128-bit WEP | 152-bit WEP | 64-bit WEP | WPA | WPA-PSK | WPA2 | WPA2-PSK
|
-
|
64/128/152bit WEP, WPA, WPA2, WPS
|
-
|
WEP | WPA | WPA2-PSK | WPS
|
-
|