-
1
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and ZJ. Haas, "Securing Ad Hoc Networks," IEEE Network, vol.13, no.6, 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
2
-
-
0034777647
-
Capacity of ad hoc wireless networks
-
Jinyang Li, Charles Blake, Douglas S. J. De Couto, Hu Imm Lee, Robert Morris, "Capacity of Ad Hoc Wireless Networks," In Proc. Of Mobicom (mobicom01) conference, 200l.
-
(2001)
Proc. of Mobicom (mobicom01) Conference
-
-
Li, J.1
Blake, C.2
De Couto, D.S.J.3
Lee, H.I.4
Morris, R.5
-
3
-
-
67649673936
-
Vulnerabilities of IEEE 802.11i wireless LAN
-
February, Issn 1305-5313
-
M. Junaid, Dr Muid Mufti, M.Umar Ilyas, "Vulnerabilities of IEEE 802.11i Wireless LAN," Transactions On Engineering, Computing And Technology Vll February 2006 Issn 1305-5313.
-
(2006)
Transactions on Engineering, Computing and Technology
, vol.11
-
-
Junaid, M.1
Mufti, M.2
Umar Ilyas, M.3
-
5
-
-
77956021482
-
-
US-CERT, produced by USCERT, a government organization
-
US-CERT, "Using Wireless Technology Securely," produced by USCERT, a government organization, 2008
-
(2008)
Using Wireless Technology Securely
-
-
-
6
-
-
77956024247
-
-
available at
-
Michael Roche ,"Wireless Hacking Tools," available at http://www.cse.wustl.edul~jain/cse571-07/ftp/wireless-hacking/
-
Wireless Hacking Tools
-
-
Roche, M.1
-
7
-
-
77956051938
-
Breaking WEP with any 104-bit keys-all WEP keys can be recovered using IP packets only
-
CDROM, 1A2-6, Jan.
-
R. Terarnura, Y. Asakura, T. Ohigashi, H. Kuwakado, and M. Morii, "Breaking WEP with Any 104-bit Keys-All WEP Keys Can Be Recovered Using IP Packets Only," Proc. of SCIS2009, CDROM, 1A2-6, Jan. 2009.
-
(2009)
Proc. of SCIS2009
-
-
Terarnura, R.1
Asakura, Y.2
Ohigashi, T.3
Kuwakado, H.4
Morii, M.5
-
9
-
-
77956050100
-
Interconnection and the internet
-
D. Waterman (Eds.) Selected papers from the
-
D. Waterman (Eds.), "Interconnection and the internet": Selected papers from the 1996 TC conference.
-
(1996)
TC Conference
-
-
-
10
-
-
33444473347
-
Weaknesses in the temporal key hash of WPA
-
V. Moen, H. Raddum, and KJ. Hole, "Weaknesses in the temporal key hash of WPA," ACM SIGMOBILE Mobile Computing and Communications Review, vol.8, pp.76-S3, 2004.
-
(2004)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.8
-
-
Moen, V.1
Raddum, H.2
Hole, K.J.3
-
12
-
-
77956049006
-
Wireless Ian medium access control (MAC) and physical layer (PHY) specifications
-
IEEE-SA Standards Board, IEEE. Website Searches
-
IEEE-SA Standards Board, "Wireless Ian medium access control (MAC) and physical layer (PHY) specifications," Communications Magazine, IEEE, 2007. Website Searches
-
(2007)
Communications Magazine
-
-
-
14
-
-
77956053596
-
-
IEEE 802.11 working group
-
IEEE 802.11 working group, http://grouper.ieee.orglgroups/802/11/index. htrnl
-
-
-
-
16
-
-
77956042861
-
-
WiFi -Windows, (Cain & Able) http://www.NetStumbler.com
-
WiFi -Windows, http://www.oxid.it (Cain & Able) http://www. NetStumbler.com
-
-
-
-
17
-
-
77956039168
-
-
WiFi-Linux, (Kismet) http://freshmeat.net/projects/aircrack(Aircrack) http://sourceforge.net/projects/airsnort (Airsnort) http://sourceforge.net/ projects/airpwn (Airpwn) http://wepcrack.sourceforge.net (WEPCrack)
-
WiFi-Linux, http://www.kismetwireless.net/ (Kismet) http://freshmeat.net/ projects/aircrack(Aircrack) http://sourceforge.net/projects/airsnort (Airsnort) http://sourceforge.net/projects/airpwn (Airpwn) http://wepcrack.sourceforge.net (WEPCrack)
-
-
-
-
18
-
-
77956048548
-
-
IEEE 802.15 working group
-
IEEE 802.15 working group, http://grouper.ieee.orglgroups/802/15/index. htrnl
-
-
-
-
19
-
-
77956047068
-
-
IEEE 802 LANIMAN Standards Committee, Text Books
-
IEEE 802 LANIMAN Standards Committee, http://grouper.ieee.orglgroups/802/ index.html Text Books
-
-
-
-
21
-
-
77956024246
-
-
Wiley Publications, available at
-
Wiley Publications, "Introduction To Ethical Hacking," available at www.media.wiley.com
-
Introduction to Ethical Hacking
-
-
|