A Survey of Wireless Security
暂无分享,去创建一个
[1] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[2] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[3] Scott D. Lathrop. A Survey of 802.11a Wireless Security Threats and Security Mechanisms , 2003 .
[4] Jason Smith,et al. Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks , 2006, ACSW.
[5] Dejan Simic,et al. Holistic approach to Wep protocol in securing wireless network infrastructure , 2006, Comput. Sci. Inf. Syst..
[7] Jyh-Cheng Chen,et al. Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.
[8] Kefei Chen,et al. Some remarks on the TKIP key mixing function of IEEE 802.11i , 2006, IACR Cryptol. ePrint Arch..
[9] Ivan Martinovic,et al. Phishing in the Wireless: Implementation and Analysis , 2007, SEC.
[10] Jason Smith,et al. Specification-Based Intrusion Detection in WLANs , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[11] Lei Han,et al. A Threat Analysis of The Extensible Authentication Protocol , 2006 .
[12] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[13] Floriano De Rango,et al. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..
[14] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[15] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[16] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[17] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[18] M. Looi,et al. A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs , 2004, 2004 Symposium on Wireless Telecommunications.