The application research of TNC hyperchaos encryption in WLAN security
暂无分享,去创建一个
Wenchao Li | Hongbo Bi | Yue Hu | Xiufang Wang | Hongbo Bi | Xiufang Wang | Yuelong Hu | Wenchao Li
[1] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[2] L. Chua,et al. CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .
[3] Sultan Weatherspoon,et al. Overview of IEEE 802.11b Security , 2000 .
[4] X. Mou,et al. Improving security of a chaotic encryption approach , 2001, Physics Letters A.
[5] Robert Boncella. Wireless Security: An Overview , 2002, Commun. Assoc. Inf. Syst..
[6] A. S. Krishnakumar,et al. Tackling security vulnerabilities in VPN-based wireless deployments , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).