A Comparative study of Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) and Temporal Key Integrity Protocol (TKIP): Wireless Security
暂无分享,去创建一个
[1] Ammar Lodhi. Cryptanalysis of IEEE 802.11i TKIP. , 2010 .
[2] Vallipuram Muthukkumarasamy,et al. A Study of the TKIP Cryptographic DoS Attack , 2007, 2007 15th IEEE International Conference on Networks.
[3] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] G. Padmavathi,et al. CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks , 2010 .
[6] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[7] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.