Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
暂无分享,去创建一个
John Ioannidis | Aviel D. Rubin | Adam Stubblefield | A. Rubin | A. Stubblefield | J. Ioannidis | John Ioannidis
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[3] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[4] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[5] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[6] David J. Goodman,et al. Personal Communications , 1994, Mobile Communications.
[7] Jon Postel,et al. Standard for the transmission of IP datagrams over IEEE 802 networks , 1988, RFC.
[8] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[9] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[10] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[11] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[12] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[13] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..