Security Analysis of Michael: The IEEE 802.11i Message Integrity Code
暂无分享,去创建一个
[1] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[2] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[3] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[4] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[5] Avishai Wool,et al. A note on the fragility of the "Michael" message integrity code , 2004, IEEE Transactions on Wireless Communications.
[6] Richard A. Johnson. Miller & Freund's Probability and Statistics for Engineers , 1993 .
[7] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .