메뉴 건너뛰기




Volumn , Issue , 2006, Pages

RC4-based security in ethernet passive optical networks

Author keywords

[No Author keywords available]

Indexed keywords

KEY DISTRIBUTION; SECRET KEYS; SECURITY VULNERABILITIES; STREAMING CIPHER;

EID: 50949133904     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.275     Document Type: Conference Paper
Times cited : (1)

References (8)
  • 3
    • 18944365386 scopus 로고    scopus 로고
    • Analysis and solutions of security issue in Ethernet PON. Network Architectures, Management, and Applications II
    • Yu Meng, Tao Jiang, Dingzhong Xiao, Analysis and solutions of security issue in Ethernet PON. Network Architectures, Management, and Applications II. Proc. Of SPIE, Vol.5626, 2005, pp. 391-399
    • (2005) Proc. Of SPIE , vol.5626 , pp. 391-399
    • Meng, Y.1    Jiang, T.2    Xiao, D.3
  • 5
    • 0003355415 scopus 로고    scopus 로고
    • Weaknesses in the Key Scheduling Algorithm of RC4
    • Fluthrer, Mantin and Shamir, Weaknesses in the Key Scheduling Algorithm of RC4. Proceeding of SAC, 2001, Vol.2259
    • (2001) Proceeding of SAC , vol.2259
    • Fluthrer, M.1    Shamir2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.