-
1
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
May
-
Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. Security flaws in 802.11 data link protocols. Communications of the ACM, 46(5):35-39, May 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
, pp. 35-39
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
2
-
-
48149100685
-
-
Niels Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE 802.11 Working Group Document 02/020r0, Institution of Electrical and Electronics Engineers, January 2002. Available from http://grouper.ieee.org/groups/802/11/ Documents/DocumentHolder/2-020.zip.
-
Niels Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE 802.11 Working Group Document 02/020r0, Institution of Electrical and Electronics Engineers, January 2002. Available from http://grouper.ieee.org/groups/802/11/ Documents/DocumentHolder/2-020.zip.
-
-
-
-
3
-
-
7544239419
-
A note on the fragility of the "Michael" message integrity code
-
September
-
Avishai Wool. A note on the fragility of the "Michael" message integrity code. IEEE Transactions on Wireless Communications, 3(5):1459-1462, September 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.5
, pp. 1459-1462
-
-
Wool, A.1
-
4
-
-
48149110751
-
-
LAN/MAN Standard Committee of the IEEE Computer Society, Institution of Electrical and Electronics Engineers, July 2004. Available from
-
LAN/MAN Standard Committee of the IEEE Computer Society. IEEE Std 802.11i, Part 11: Medium Access Control (MAC) security enhancements. Institution of Electrical and Electronics Engineers, July 2004. Available from http://www.ieee.org/getIEEE.
-
IEEE Std 802.11i, Part 11: Medium Access Control (MAC) security enhancements
-
-
-
5
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
New York, NY, USA, ACM SIGMOBILE, ACM Press
-
Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11. In Proceedings of the 7th Annual International Mobile Computing and Networking Conference, pages 180-189, New York, NY, USA, 2001. ACM SIGMOBILE, ACM Press.
-
(2001)
Proceedings of the 7th Annual International Mobile Computing and Networking Conference
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
48149097806
-
-
Personal communication with author. email, May
-
Nikita Borisov. Personal communication with author. email, May 2007.
-
(2007)
-
-
Borisov, N.1
-
7
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
San Francisco, CA, June, Institution of Electrical and Electronics Engineers
-
Pradeep Kyasanur and Nitin H. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. In International Conference on Dependable Systems and Networks (DSN'03), pages 173-, San Francisco, CA, June 2003. Institution of Electrical and Electronics Engineers.
-
(2003)
International Conference on Dependable Systems and Networks (DSN'03)
, pp. 173
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
9
-
-
79955055383
-
Protecting wireless networks against a Denial of Service attack based on virtual jamming (poster session)
-
David B. Johnson, Anthony D. Joseph, and Nitin H. Vaidya, editors, San Diego, CA, USA, September, SIGMobile, ACM
-
Dazhi Chen, Jing Deng, and Pramod K. Varshney. Protecting wireless networks against a Denial of Service attack based on virtual jamming (poster session). In David B. Johnson, Anthony D. Joseph, and Nitin H. Vaidya, editors, The Ninth ACM Annual International Inproceedings on Mobile Computing and Networking (MobiCom 2003), San Diego, CA, USA, September 2003. SIGMobile, ACM.
-
(2003)
The Ninth ACM Annual International Inproceedings on Mobile Computing and Networking (MobiCom 2003)
-
-
Chen, D.1
Deng, J.2
Varshney, P.K.3
-
10
-
-
84925368904
-
-
John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003. Available from http://www.usenix.org/publications/library/proceedings/sec03/tech/bellar do.html.
-
John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003. Available from http://www.usenix.org/publications/library/proceedings/sec03/tech/bellardo.html.
-
-
-
-
11
-
-
48149103484
-
-
Bernard Aboba. Issues in pre-standard IEEE 802.11i implementations. Webpage, 2004. Available from http://www.drizzle.com/~aboba/IEEE/prestand.html.
-
Bernard Aboba. Issues in pre-standard IEEE 802.11i implementations. Webpage, 2004. Available from http://www.drizzle.com/~aboba/IEEE/prestand.html.
-
-
-
-
12
-
-
3042619294
-
Improving the security of wireless LANs by managing 802.1X disassociation
-
Institution of Electrical and Electronics Engineers, January
-
Ping Q. Ding, JoAnne Holliday, and Aslihan Celik. Improving the security of wireless LANs by managing 802.1X disassociation. In Proceedings of the First IEEE Consumer Communications and Networking Conference, pages 53-58. Institution of Electrical and Electronics Engineers, January 2004.
-
(2004)
Proceedings of the First IEEE Consumer Communications and Networking Conference
, pp. 53-58
-
-
Ding, P.Q.1
Holliday, J.2
Celik, A.3
-
13
-
-
11244278744
-
Analysis of the 802.11i 4-way handshake
-
New York, NY, USA, ACM Press
-
Changhua He and John C. Mitchell. Analysis of the 802.11i 4-way handshake. In WiSe '04: Proceedings of the 2004 ACM Workshop on Wireless Security, pages 43-50, New York, NY, USA, 2004. ACM Press.
-
(2004)
WiSe '04: Proceedings of the 2004 ACM Workshop on Wireless Security
, pp. 43-50
-
-
He, C.1
Mitchell, J.C.2
-
14
-
-
85143166035
-
Security analysis and improvements for IEEE, 802.11i
-
The Internet Society, February 2005. Available from
-
Changhua He and John C. Mitchell. Security analysis and improvements for IEEE, 802.11i. In Network and Distributed System Security Symposium Proceedings: 2005, pages 90-110. The Internet Society, February 2005. Available from http://www.isoc.org/isoc/conferences/ndss/05/proceedings/index. htm.
-
(2005)
Network and Distributed System Security Symposium Proceedings
, pp. 90-110
-
-
He, C.1
Mitchell, J.C.2
-
15
-
-
48149112716
-
-
Dan Harkins. Attacks against Michael and their countermeasures. IEEE 802.11 Working Group Document 03/211r0, Institution of Electrical and Electronics Engineers, March 2003. Available from http://grouper.ieee.org/ groups/802/11/Documents/DocumentHolder/3-211.zip.
-
Dan Harkins. Attacks against Michael and their countermeasures. IEEE 802.11 Working Group Document 03/211r0, Institution of Electrical and Electronics Engineers, March 2003. Available from http://grouper.ieee.org/ groups/802/11/Documents/DocumentHolder/3-211.zip.
-
-
-
-
17
-
-
4544317724
-
Wireless intrusion detection and response: A case study using the classic man-in-themiddle attack
-
March
-
Tim Schmoyer, Yu-Xi Lim, and Henry L. Owen. Wireless intrusion detection and response: a case study using the classic man-in-themiddle attack. In 2004 IEEE Wireless Communications and Networking Conference, volume 2, pages 883-888, March 2004.
-
(2004)
2004 IEEE Wireless Communications and Networking Conference
, vol.2
, pp. 883-888
-
-
Schmoyer, T.1
Lim, Y.-X.2
Owen, H.L.3
-
18
-
-
48149096827
-
-
Information security breaches survey. Technical report, April, Available from
-
Price Waterhouse Coopers. Information security breaches survey. Technical report, DTI, April 2006. Available from http://www.pwc.com/Extweb/ pwcpublications.nsf/docid/F9843CD3C8E0FB828025715A0058C63B.
-
(2006)
-
-
Waterhouse Coopers, P.1
-
19
-
-
48149085835
-
-
Phil Cracknell. Wireless security survey of London 2006. A report commissioned by RSA Security 5th edition, RSA Security, Bracknell, UK, May 2006. Available only on request.
-
Phil Cracknell. Wireless security survey of London 2006. A report commissioned by RSA Security 5th edition, RSA Security, Bracknell, UK, May 2006. Available only on request.
-
-
-
|