Wi-Fi security: wireless with confidence
暂无分享,去创建一个
[1] B. Issac,et al. The art of war driving and security threats - a Malaysian case study , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[2] Suen Yek,et al. Wily attackers seek wireless networks in Perth, Western Australia for easy targets , 2006 .
[3] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[4] Johnny Cache,et al. HACKING EXPOSED™ WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION , 2010 .
[5] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[6] Stefano Basagni,et al. Hack Boston: Monitoring Wireless Security Awareness in an Urban Setting , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[7] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[8] Masakatu Morii,et al. A Practical Message Falsification Attack on WPA , 2009 .
[9] Johnny Cache,et al. Hacking Exposed Wireless: Wireless Security Secrets & Solutions , 2007 .
[10] Ammar Lodhi. Cryptanalysis of IEEE 802.11i TKIP. , 2010 .
[11] Hal Berghel. Wireless infidelity I: war driving , 2004, CACM.
[12] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[13] Chris Hurley,et al. WarDriving: Drive, Detect, Defend: A Guide to Wireless Security , 2004 .
[14] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[15] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[16] Fadi A. Aloul. Information security awareness in UAE: A survey paper , 2010, 2010 International Conference for Internet Technology and Secured Transactions.