On enhancing the WEP security against brute-force and compromised keys
暂无分享,去创建一个
[1] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[2] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[3] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[4] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[5] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[6] Hideki Imai,et al. Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks , 2000 .
[7] John C. Mitchell,et al. Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.
[8] Chen-Wei Yang,et al. Secure enhanced wireless transfer protocol , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[9] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.