Verschlüsselungstechnologien |
WPA3, WPA2
|
WEP | WPA | WPA2 | WPA3
|
WPS, WPA2, WPA, WEP, WPA3
|
WEP, WPA, WPA2, WPS, WPA3
|
WEP, WPA, WPA2, WPA3, WPS
|
WPA3, WPA2
|
WPA2, WPA3
|
WEP, WPA, WPA2, WPA3, WPS
|
128-bit WEP | 152-bit WEP | 64-bit WEP | WPA-PSK | WPA2-PSK
|
WPS, WPA2, WPA, WEP, WPA3
|
WPA2-Personal, WPA-Personal, 128-Bit WEP, 64-Bit WEP
|
WEP, WPA, WPA2, WPA3, WPS
|
WPA2, WPA3
|
64-bit WEP,128-bit WEP,WPA-PSK,WPA2-PSK
|
128-bit WEP | 152-bit WEP | 64-bit WEP | WPA-PSK | WPA2-PSK
|
-
|
Verschlüsselung vor Übertragung, Re-keying - fortlaufende Änderung des Schlüssels bei Übertragung
|
WEP | WPA | WPA2-PSK | WPS
|
-
|
WPA2-PSK, WEP, WPA
|