A method of detecting and avoiding the Queensland attack based on the beacon interval
暂无分享,去创建一个
Qiang Guo | Ying-hui Liu | Ying-long Wang | Jia-Liang Lv | Nuo Wei | Yinglong Wang | Q. Guo | Nuo Wei | Ying-hui Liu | Jiatong Lv
[1] Christian Wullems. Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models , 2005 .
[2] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[3] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[4] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[5] David R. Cheriton,et al. DoS and authentication in wireless public access networks , 2002, WiSE '02.
[6] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[7] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[8] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[9] Jason Smith,et al. Denial of service : prevention, modelling and detection , 2007 .