WEP Flaws and Implementation Flaws of WEP Flaws and Implementation Flaws of Authentication Protocols Authentication Protocols
暂无分享,去创建一个
[1] M.R. Stytz. How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN [Book Review] , 2004, IEEE Security & Privacy Magazine.
[2] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[3] H. Boland,et al. Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[4] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[5] Lee Barken. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN , 2003 .