메뉴 건너뛰기




Volumn 5838 LNCS, Issue , 2009, Pages 120-132

An improved attack on TKIP

Author keywords

[No Author keywords available]

Indexed keywords

ARP POISONING; CONTROL PROTOCOLS; DOS ATTACKS; IEEE802.11I; KEYSTREAM; METHOD OF ANALYSIS;

EID: 78650757225     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04766-4_9     Document Type: Conference Paper
Times cited : (13)

References (8)
  • 2
    • 79952366251 scopus 로고    scopus 로고
    • KoreK
    • KoreK: chopchop (Experimental WEP attacks) (2004), http://www. netstumbler.org/f50/chopchop-experimental-wep-attacks-12489/
    • (2004) Chopchop (Experimental WEP Attacks)
  • 4
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm
    • Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. Springer, Heidelberg
    • Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1-24. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 5
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
    • Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7, 319-332 (2004)
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , pp. 319-332
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3
  • 6
    • 33751038485 scopus 로고    scopus 로고
    • The Final Nail in WEP's Coffin Security and Privacy
    • Bittau, A., Handley, M., Lackey, J.: The Final Nail in WEP's Coffin Security and Privacy. In: IEEE Symposium on, pp. 386-400 (2006)
    • (2006) IEEE Symposium on , pp. 386-400
    • Bittau, A.1    Handley, M.2    Lackey, J.3
  • 8
    • 33751050307 scopus 로고    scopus 로고
    • KoreK
    • KoreK.: Next generation of WEP attacks (2004), http://www.netstumbler. org/showpost.php?p=93942&postcount=35
    • (2004) Next Generation of WEP Attacks


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.