-
1
-
-
0003508558
-
-
National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce (Nov)
-
Advanced encryption standard, National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce (Nov 2001).
-
(2001)
Advanced Encryption Standard
-
-
-
3
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
W.A. Arbaugh, N. Shankar, Y.C.J. Wan and K. Zhang, Your 802.11 wireless network has no clothes, IEEE Wireless Communications 9(6) (2002) 44-51.
-
(2002)
IEEE Wireless Communications
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.A.1
Shankar, N.2
Wan, Y.C.J.3
Zhang, K.4
-
7
-
-
84888912174
-
Cisco Aironet security solution provides dynamic WEP to address researchers' concerns
-
Cisco Aironet security solution provides dynamic WEP to address researchers' concerns. Cisco Product Bulletin, No. 1281 (2001). http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/1281_pp.htm.
-
(2001)
Cisco Product Bulletin
, vol.1281
-
-
-
8
-
-
84888919932
-
-
Cisco wireless LAN security (2002). http://www.cisco.com/warp/public/779/ smbiz/wireless/wlan_security.shtml/.
-
(2002)
-
-
-
9
-
-
84888901389
-
Configuring a FreeBSD access point for your wireless network
-
M.S. DeGraw-Bertsch, Configuring a FreeBSD access point for your wireless network, Sys Admin 11(3) (2002).
-
(2002)
Sys Admin
, vol.11
, Issue.3
-
-
DeGraw-Bertsch, M.S.1
-
10
-
-
7544234721
-
-
Document number IEEE 802.11-02/020r0
-
N. Ferguson, Michael: An improved MIC for 802.11 WEP (2002). Document number IEEE 802.11-02/020r0. Available from http://grouper.ieee.org/groups/802/ 11/Documents/DocumentHolder/2-020.zip.
-
(2002)
Michael: An Improved MIC for 802.11 WEP
-
-
Ferguson, N.1
-
11
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Springer-Verlag
-
S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in: Proc. 8th Workshop on Selected Areas in Cryptography, LNCS 2259, Springer-Verlag (2001).
-
(2001)
Proc. 8th Workshop on Selected Areas in Cryptography, LNCS
, vol.2259
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
12
-
-
84888892217
-
-
v0.9.2
-
freeRADIUS (2003), v0.9.2. http://www.freeradius.org/.
-
(2003)
-
-
-
13
-
-
84888904648
-
-
P. Gutman, Cryptlib 3.0 (2002). Available from http://www.cs.auckland.ac. nz/~pgut001/cryptlib/.
-
(2002)
Cryptlib 3.0
-
-
Gutman, P.1
-
15
-
-
62749114696
-
Standards for local and metropolitan area networks: Standard for port based network access control
-
Standards for local and metropolitan area networks: Standard for port based network access control. IEEE Draft P802.1X/D11 (2001).
-
(2001)
IEEE Draft P802.1X/D11
-
-
-
18
-
-
84888918709
-
-
Linksys group - wireless (2002). http://www.linksys.com/Products/.
-
(2002)
-
-
-
19
-
-
0013046241
-
An initial security analysis of the IEEE 802.1x standard
-
U. Maryland, College Park, MD 20742 (Feb.)
-
A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802.1x standard. Technical Report UMIACS-TR-2002-10, U. Maryland, College Park, MD 20742 (Feb. 2002).
-
(2002)
Technical Report
, vol.UMIACS-TR-2002-10
-
-
Mishra, A.1
Arbaugh, W.A.2
-
20
-
-
84888931002
-
-
Personal communication (August)
-
J. Malinen, Personal communication (August 2002).
-
(2002)
-
-
Malinen, J.1
-
22
-
-
84944878354
-
-
CRC Press, Boca Raton, Florida
-
A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, (CRC Press, Boca Raton, Florida, 1996).
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
25
-
-
84888886460
-
-
Intersil
-
Prism wireless LAN, Intersil. http://www.intersil.com/design/prism/ (2002).
-
(2002)
Prism Wireless LAN
-
-
-
28
-
-
84888923372
-
A transparent key management scheme for wireless LANs using DHCP
-
N. Shankar, W.A. Arbaugh and K. Zhang, A transparent key management scheme for wireless LANs using DHCP. HP Labs Technical Report HPL-2001-227 (2001). http://www.hpl.hp.com/techreports/2001/HPL-2001-227.html.
-
(2001)
HP Labs Technical Report
, vol.HPL-2001-227
-
-
Shankar, N.1
Arbaugh, W.A.2
Zhang, K.3
-
30
-
-
0003629991
-
-
National Institute of Standards and Technology, NIST FIPS PUB 180-1, U.S. Department of Commerce (April)
-
Secure hash standard, National Institute of Standards and Technology, NIST FIPS PUB 180-1, U.S. Department of Commerce (April 1995).
-
(1995)
Secure Hash Standard
-
-
-
31
-
-
84889956484
-
Using the Fluhrer, Mantin, and Shamir attack to break WEP
-
The Internet Society
-
A. Stubblefield, J. Ioannidis and A. Rubin, Using the Fluhrer, Mantin, and Shamir attack to break WEP, in: Proc. 9th Network and Distributed System Security Symposium (NDSS'02). The Internet Society (2002).
-
(2002)
Proc. 9th Network and Distributed System Security Symposium (NDSS'02)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
-
32
-
-
6344225925
-
-
Electronic publication
-
J. Tourrilhes, Wireless tools for Linux, Electronic publication, (2002) http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Tools.html.
-
(2002)
Wireless Tools for Linux
-
-
Tourrilhes, J.1
-
35
-
-
7544239419
-
A note on the fragility of the "Michael" message integrity code
-
A. Wool, A note on the fragility of the "Michael" message integrity code. IEEE Trans. Wireless Communications 3(5) (2004) 1459-1462.
-
(2004)
IEEE Trans. Wireless Communications
, vol.3
, Issue.5
, pp. 1459-1462
-
-
Wool, A.1
-
36
-
-
84888926362
-
-
Document number IEEE 802.11-01/540r0
-
A. Young and B. O'Hara, A re-key proposal, Document number IEEE 802.11-01/540r0 (2001). Available from http://grouper.ieee.org/groups/802/11/ Documents/DocumentHolder/1-540.zip.
-
(2001)
A Re-key Proposal
-
-
Young, A.1
O'Hara, B.2
|