![]() |
Volumn 3802 LNAI, Issue , 2005, Pages 17-26
|
FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTATIONAL METHODS;
COMPUTER SCIENCE;
INFORMATION TECHNOLOGY;
SECURITY OF DATA;
ATTACK TRANSFORMS;
ATTACK-RESISTANTS;
COMPUTATIONAL TIMES;
FMS ATTACK;
COMPUTER CRIME;
|
EID: 33646844622
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/11596981_3 Document Type: Conference Paper |
Times cited : (7)
|
References (6)
|