A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
暂无分享,去创建一个
Arash Habibi Lashkari | A. H. Lashkari | M.M.S. Danesh | Behrang Samadi | Behrang Samadi | M.M.S. Danesh
[1] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[2] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) , 2009, 2009 International Conference on Future Computer and Communication.
[3] Bhagyavati,et al. Wireless security techniques: an overview , 2004, InfoSecCD '04.
[4] Kouichi Sakurai,et al. Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i , 2006, Mobility '06.
[5] Halil-Ibrahim Bulbul,et al. Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols , 2008, e-Forensics '08.
[6] Kjell Jørgen Hole,et al. Weaknesses in the temporal key hash of WPA , 2004, MOCO.
[7] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[8] Y. Challal,et al. Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..
[9] Ross Hytnen,et al. An analysis of wireless security , 2006 .
[10] James Kempf. Wireless Internet Security - Architecture and Protocols , 2008 .
[11] John L. MacMichael. Auditing wi-fi protected access (WPA) pre-shared key mode , 2005 .
[12] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.