-
1
-
-
47249113769
-
-
IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
-
IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
-
-
-
-
2
-
-
47249140253
-
-
R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
-
R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
-
-
-
-
3
-
-
0004104571
-
Unsafe At Any Key Size: An Analysis of the WEP Encapsulation,
-
03628E, IEEE 802.11 Committee, Mar
-
J. Walker, Unsafe At Any Key Size: An Analysis of the WEP Encapsulation, tech. report 03628E, IEEE 802.11 Committee, Mar. 2000.
-
(2000)
tech. report
-
-
Walker, J.1
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy, pp, July
-
N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications: The insecurity of 802.11. In Proc. of the 7th Annual ACM/EEE International Conf on Mobile Computing and Networking - Mobicom'01, Rome, Italy, pp. 180-189, July 2001.
-
(2001)
Proc. of the 7th Annual ACM/EEE International Conf on Mobile Computing and Networking - Mobicom'01
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
0003477171
-
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
-
Technical Report TD-4ZCPZZ, AT&T Labs
-
A.Stubblefield, J.Ioannidis, A.Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Technical Report TD-4ZCPZZ, AT&T Labs(2001)
-
(2001)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
-
7
-
-
47249092665
-
-
Airsnort: airsnort.shmoo.com
-
Airsnort: airsnort.shmoo.com
-
-
-
-
8
-
-
47249138111
-
-
Aircrack: www.cr0.net:8040/code/network/
-
Aircrack
-
-
-
9
-
-
47249084575
-
-
WepLab: weplab.sourceforge.net/
-
WepLab: weplab.sourceforge.net/
-
-
-
-
10
-
-
0022114816
-
Message authentication
-
Sept
-
R. Jueneman, S. Matyas, and C. Meyer. Message authentication. IEEE Comm. Magazine, 23(9):pp. 29-40, Sept. 1985.
-
(1985)
IEEE Comm. Magazine
, vol.23
, Issue.9
, pp. 29-40
-
-
Jueneman, R.1
Matyas, S.2
Meyer, C.3
-
12
-
-
47249140252
-
-
Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
-
Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
-
-
-
-
14
-
-
47249142288
-
-
Airjack: sourceforge.net/projects/airjack
-
Airjack: sourceforge.net/projects/airjack/
-
-
-
-
15
-
-
47249128862
-
-
KisMAC: binaervarianz.de/projekte/
-
KisMAC: binaervarianz.de/projekte/
-
-
-
-
16
-
-
47249111578
-
-
Void11: www.wlsec.net/void11/
-
Void11
-
-
-
19
-
-
47249095263
-
-
IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
-
IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
-
-
-
-
20
-
-
13244299564
-
-
RFC 3748, June
-
B. Aboba, L. Blunk, J. Carlson, E. Levkowetz, and J. Vollbrecht, "Extensible authentication protocol (EAP)." RFC 3748, June 2004.
-
(2004)
Extensible authentication protocol (EAP)
-
-
Aboba, B.1
Blunk, L.2
Carlson, J.3
Levkowetz, E.4
Vollbrecht, J.5
-
21
-
-
47249119533
-
-
coWPAtty: new.remote-exploit.org/
-
coWPAtty: new.remote-exploit.org/
-
-
-
-
22
-
-
0013046241
-
An initial security analysis of the IEEE 802. IX standard. Technical Report
-
Dept. Of CS, Univ. of Maryland, Feb
-
A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802. IX standard. Technical Report, UMIACS-TR-2002-10, Dept. Of CS, Univ. of Maryland, Feb. 2002.
-
(2002)
UMIACS-TR-2002-10
-
-
Mishra, A.1
Arbaugh, W.A.2
-
23
-
-
33444473347
-
Weaknesses in the temporal key hash of WPA
-
April
-
V. Moen , H. Raddum , K. J. Hole, Weaknesses in the temporal key hash of WPA, ACM SIGMOBILE Mobile Computing and Communications Review, v.8 n.2, April 2004
-
(2004)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.8
, Issue.2
-
-
Moen, V.1
Raddum, H.2
Hole, K.J.3
-
24
-
-
47249131951
-
-
IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
-
IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
-
-
-
-
25
-
-
47249116431
-
-
Advanced Encryption Standard (FIPS PUB 197). National Institute of Standards and Technology (NIST), November 2001.
-
"Advanced Encryption Standard (FIPS PUB 197)." National Institute of Standards and Technology (NIST), November 2001.
-
-
-
-
26
-
-
47249091671
-
-
AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
-
AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
-
-
-
-
27
-
-
84925368904
-
802.11 Denial-of-Service attacks: Real vulnerabilities andpractical solutions
-
August
-
J. Bellardo, and S. Savage. 802.11 Denial-of-Service attacks: real vulnerabilities andpractical solutions. In Proc. of the USENIX Security Symposium, pp. 15-28, August, 2003.
-
(2003)
Proc. of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
28
-
-
47249157532
-
-
SpoofMAC
-
SpoofMAC: www.klcconsulting.net/smac/
-
-
-
-
29
-
-
47249110143
-
-
Airsnarf: airsnarf.shmoo.com
-
Airsnarf: airsnarf.shmoo.com
-
-
-
-
32
-
-
4544330951
-
Detecting Wireless LAN MAC Address Spoofing,
-
jwright/papers
-
J. Wright, Detecting Wireless LAN MAC Address Spoofing, (2003): home.jwu.edu/jwright/papers/
-
-
-
Wright, J.1
-
33
-
-
34547139799
-
Security in an Insecure WLAN Network
-
F. Anjum, S. Das, P. Gopalakrishnan, L. Kant, K. Byungsuk, Security in an Insecure WLAN Network, In Proc. of the International Conf on Wireless Networks, Communications and Mobile Computing, 2005, pp. 292- 297
-
(2005)
Proc. of the International Conf on Wireless Networks, Communications and Mobile Computing
, pp. 292-297
-
-
Anjum, F.1
Das, S.2
Gopalakrishnan, P.3
Kant, L.4
Byungsuk, K.5
-
35
-
-
27544454487
-
Multilevel Monitoring and Detection Systems (MMDS)
-
Ottawa, Canada June 22-27
-
D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti. Multilevel Monitoring and Detection Systems (MMDS). In Proc. of the 15 th Annual Computer Security Incident Handling Conference (FIRST), Ottawa, Canada June 22-27, 2003
-
(2003)
Proc. of the 15 th Annual Computer Security Incident Handling Conference (FIRST)
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Kaniganti, M.4
-
36
-
-
85139567592
-
802.11 Network Intrusion Detection using Genetic Programming
-
Washington, D.C
-
P. LaRoche, A. N. Zincir-Heywood, 802.11 Network Intrusion Detection using Genetic Programming, In Proc. of the 2005 workshops on Genetic and evolutionary computation, Washington, D.C, 2005,pp. 170 - 171
-
(2005)
Proc. of the 2005 workshops on Genetic and evolutionary computation
, pp. 170-171
-
-
LaRoche, P.1
Zincir-Heywood, A.N.2
-
37
-
-
47249134897
-
Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks
-
Q. Li, W. Trappe, Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks, Presentation, www.winlab.rutgers.edu/pub/docs/iab/ 20 0 5Fall/
-
Presentation
-
-
Li, Q.1
Trappe, W.2
-
38
-
-
47249152152
-
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
-
H. Xia, and J. Brustoloni, Detecting and Blocking Unauthorized Access in Wi-Fi Networks. In Proc. of Networking'2004
-
Proc. of Networking'2004
-
-
Xia, H.1
Brustoloni, J.2
-
39
-
-
47249161014
-
-
B. Aboba, IEEE 802. IX PreAuthentication. Presentation to 802.11WGi, July 2002.
-
B. Aboba, IEEE 802. IX PreAuthentication. Presentation to 802.11WGi, July 2002.
-
-
-
-
41
-
-
47249150846
-
Validating 802.11 Disassociation and Deauthentication messages
-
September
-
T. Moore, Validating 802.11 Disassociation and Deauthentication messages. Submission to IEEE P802.11 TGi, September, 2002.
-
(2002)
Submission to IEEE P802.11 TGi
-
-
Moore, T.1
-
43
-
-
0036966442
-
A One-Bit Identity Authentication Protocol for Access Control
-
SOLA:, Taiwan, September
-
H. Johnson, A. Nilsson, J. Fu, S. F. Wu, A. Chen and H. Huang, SOLA: A One-Bit Identity Authentication Protocol for Access Control, In Proc. IEEE Global Telecommunications Conf., Taiwan, September 2002, vol. 1, pp 768-772.
-
(2002)
Proc. IEEE Global Telecommunications Conf
, vol.1
, pp. 768-772
-
-
Johnson, H.1
Nilsson, A.2
Fu, J.3
Wu, S.F.4
Chen, A.5
Huang, H.6
-
44
-
-
3142761839
-
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11
-
H. Wang and A. Velayutham. An enhanced one-bit identity authentication protocol for access control in IEEE 802.11. Proc. of IEEE MILCOM'03, Mil. Comm., 2003, pp 839 -843
-
(2003)
Proc. of IEEE MILCOM'03, Mil. Comm
, pp. 839-843
-
-
Wang, H.1
Velayutham, A.2
-
46
-
-
11144331561
-
Enhancing Intrusion Detection in Wireless Networks using Radio Frequency Fingerprinting
-
Nov
-
J. Hall, M. Barbeau, and E. Kranakis, Enhancing Intrusion Detection in Wireless Networks using Radio Frequency Fingerprinting, In Proc. of Comm., Internet, and Information Technology, CUT 2004, Nov 2004
-
(2004)
Proc. of Comm., Internet, and Information Technology, CUT 2004
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
47
-
-
51349089007
-
Using Transceiverprints for Anomaly Based Intrusion Detection
-
US Virgin Islands, November
-
J. Hall, M. Barbeau and E. Kranakis, Using Transceiverprints for Anomaly Based Intrusion Detection. In Proc. of 3rd IASTED, CUT 2004, US Virgin Islands, November 2004
-
(2004)
Proc. of 3rd IASTED, CUT 2004
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
48
-
-
3042619294
-
Improving the security of Wireless LANs by managing 802.1X Disassociation
-
Las Vegas, NV, January
-
P. Ding, J. Holliday, and A. Celik, Improving the security of Wireless LANs by managing 802.1X Disassociation. In Proc. of the IEEE Consumer Comm. and Networking Conf. (CCNC'04), Las Vegas, NV, January, 2004.
-
(2004)
Proc. of the IEEE Consumer Comm. and Networking Conf. (CCNC'04)
-
-
Ding, P.1
Holliday, J.2
Celik, A.3
-
49
-
-
47249142287
-
-
AirDefense: www.airdefense.net
-
AirDefense
-
-
-
50
-
-
47249095645
-
-
AirMagnet: www.airmagnet.com
-
AirMagnet
-
-
-
51
-
-
47249096094
-
-
AirSnare: home.comcast.net
-
AirSnare: home.comcast.net
-
-
-
|