Enhanced Security Scheme For IEEE 802.11 Over Wired Equivalent Privacy
暂无分享,去创建一个
[1] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[2] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[5] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[6] William Stallings,et al. Data and Computer Communications , 1985 .
[7] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[8] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .