Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities
暂无分享,去创建一个
[1] Steven Furnell,et al. Why users cannot use security , 2005, Comput. Secur..
[2] Bruce Potter,et al. Wireless Security's Future , 2003, IEEE Secur. Priv..
[3] Kjell Jørgen Hole,et al. Weaknesses in the temporal key hash of WPA , 2004, MOCO.
[4] Kjell Jørgen Hole,et al. Securing Wi-Fi Networks , 2005, Computer.
[5] Bhagyavati,et al. Wireless security techniques: an overview , 2004, InfoSecCD '04.
[6] Carsten Maple,et al. Choosing the right wireless LAN security protocol for the home and business user , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] Charles P. Pfleeger,et al. Security in computing , 1988 .
[8] Kevin Curran,et al. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks , 2006, Inf. Secur. J. A Glob. Perspect..
[9] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[10] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[11] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).