WEP and WPA Improvement
暂无分享,去创建一个
[1] Kjell Jørgen Hole,et al. Weaknesses in the temporal key hash of WPA , 2004, MOCO.
[2] William Stallings,et al. Cryptography and network security , 1998 .
[3] Ahmad Hamad,et al. Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..
[4] Mandy Andress. Wireless LAN Security , 2002, Inf. Secur. J. A Glob. Perspect..
[5] Erik Zenner. Why IV Setup for Stream Ciphers is Difficult , 2007, Symmetric Cryptography.
[6] Chen-Wei Yang,et al. Secure enhanced wireless transfer protocol , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] Sami Uskela. Security in Wireless Local Area Networks , 1997 .
[8] Y. Challal,et al. Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..
[9] Andreas Klein,et al. Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..