-
1
-
-
33745437561
-
A Survey of 802. 11a Wireless Security Threats and Security Mechanisms
-
United States Military Academy West Point, New York
-
J. WELCH, S. D. LATHROP, A Survey of 802. 11a Wireless Security Threats and Security Mechanisms. United States Military Academy West Point, New York, (2003). http://www. itoc. usma. edu/Documents/ITOC TR-2003-101 (G6). pdf
-
(2003)
-
-
Welch, J.1
Lathrop, S.D.2
-
3
-
-
85040681582
-
Phishing in the Wireless: Implementation and Analysis
-
Universitatsbibliothek Kaiserslautern
-
I. MARTINOVIC, F. A. ZDARSKY, A. BACHOREK, C. JUNG, J. B. SCHMITT, Phishing in the Wireless: Implementation and Analysis. Kaiserslauterer Uniweiter Elektronischer Dokumentenserver, Universitatsbibliothek Kaiserslautern, (2006). http://kluedo. ub. uni-kl. de/volltexte/2006/2035/pdf/martinovic. pdf
-
(2006)
Kaiserslauterer Uniweiter Elektronischer Dokumentenserver
-
-
Martinovic, I.1
Zdarsky, F.A.2
Bachorek, A.3
Jung, C.4
Schmitt, J.B.5
-
4
-
-
39049109285
-
Specification-Based Intrusion Detection inWLANs
-
Miami Beach, Florida
-
G. RUPINDE, S. JASON, C. ANDREW, Specification-Based Intrusion Detection inWLANs. 22nd Annual Computer Security ApplicationsConference, Miami Beach, Florida, (2006)
-
(2006)
22nd Annual Computer Security ApplicationsConference
-
-
Rupinde, G.1
Jason, S.2
Andrew, C.3
-
5
-
-
85040695753
-
-
AUSCERTAA-2004. 02, Denial of Service Vulnerability in IEEE 802. 11 wireless devices
-
AUSCERTAA-2004. 02, Denial of Service Vulnerability in IEEE 802. 11 wireless devices. (2004). http://www. auscert. org. au/render. html? it=4091
-
(2004)
-
-
-
6
-
-
4544326203
-
ATrivial Denial of Service Attack on IEEE 802. 11 Direct Sequence Spread Spectrum Wireless LANS
-
IEEE Press
-
C. WULLEMS, K. THAM, J. SMITH, M. LOOI, ATrivial Denial of Service Attack on IEEE 802. 11 Direct Sequence Spread Spectrum Wireless LANS. IEEE Press, (2004), pp. 129-136
-
(2004)
, pp. 129-136
-
-
Wullems, C.1
Tham, K.2
Smith, J.3
Looi, M.4
-
7
-
-
33751533202
-
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack inWi-Fi Protected Access and IEEE 802. 11i
-
Hindawi Publishing Corporation
-
F. RANGO, D. C. LENTINI, S. MARANO, Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack inWi-Fi Protected Access and IEEE 802. 11i. EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, pp. 1-19, (2006)
-
(2006)
EURASIP Journal on Wireless Communications and Networking
, pp. 1-19
-
-
Rango, F.1
Lentini, D.C.2
Marano, S.3
-
8
-
-
34548171697
-
Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure
-
R. PRODANOVIC, D. SIMIC, Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure. Com SIS, Vol. 3, No. 2, pp. 97-113, (2006)
-
(2006)
Com SIS
, vol.3
, Issue.2
, pp. 97-113
-
-
Prodanovic, R.1
Simic, D.2
-
11
-
-
0002917345
-
Unsafe at any key size; An analysis of the WEP encapsulation
-
802. 11-00/362./
-
J. R. WALKER, Unsafe at any key size; An analysis of the WEP encapsulation. IEEE Document 802. 11-00/362./, (2000)
-
(2000)
IEEE Document
-
-
Walker, J.R.1
-
12
-
-
0034777649
-
Intercepting mobile communications: the insecurity of 802. 11
-
Rome, Italy
-
N. BORISOV, I. GOLDBERG, D. WAGNER, Intercepting mobile communications: the insecurity of 802. 11. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, (2001)
-
(2001)
In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
13
-
-
85040652497
-
-
WEP Fix using RC4 Fast Packet Keying. RSA Laboratories
-
WEP Fix using RC4 Fast Packet Keying. RSA Laboratories, (2002). http://www. comms. scitech. susx. ac. uk/fft/crypto/wep. pdf
-
(2002)
-
-
-
14
-
-
33748564575
-
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks, Wi-Fi Alliance
-
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks, Wi-Fi Alliance, (2003). http://www. wi-fi. org/opensection/pdf/whitepaper wi-fisecurity4-29-03. pdf
-
(2003)
-
-
-
15
-
-
85040705035
-
-
802. 11 Security Series (Part II: The Temporal Key Integrity Protocol (TKIP)). Intel Corporation
-
J. R. WALKER, 802. 11 Security Series (Part II: The Temporal Key Integrity Protocol (TKIP)). Intel Corporation. http://cache-www. intel. com/cd/00/00/01/77/17769 80211 part2. pdf
-
-
-
Walker, J.R.1
-
16
-
-
11244298350
-
Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
IEEE P802. 11i/D10. 0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, (2004)
-
(2004)
-
-
-
17
-
-
85040678271
-
Some Remarks on the TKIP Key Mixing Function of IEEE 802. 11i
-
W. HAN, D. ZHENG, K. CHEN, Some Remarks on the TKIP Key Mixing Function of IEEE 802. 11i. Cryptology ePrint Archive, (2006). http://eprint. iacr. org/2006/129. pdf
-
(2006)
Cryptology ePrint Archive
-
-
Han, W.1
Zheng, D.2
Chen, K.3
-
18
-
-
13244299564
-
-
Internet Draft draft-ietf-eap-rfc2284bis-06. txt
-
L. BLUNK, J. VOLLBRECHT, B. ABOBA, J. CARLSON, H. LEVKOWETZ, Extensible Authentication Protocol (EAP). Internet Draft draft-ietf-eap-rfc2284bis-06. txt, (2003)
-
(2003)
Extensible Authentication Protocol (EAP)
-
-
Blunk, L.1
Vollbrecht, J.2
Aboba, B.3
Carlson, J.4
Levkowetz, H.5
-
21
-
-
85040677357
-
-
Wireless Network Security 802. 11. Bluetooth and Handheld Devices, NIST
-
T. KARYGIANNIS, L. OWENS, Wireless Network Security 802. 11. Bluetooth and Handheld Devices, NIST, (2002). http://csrc. nist. gov/publications/nistpubs/800-48/nist sp 800-48. pdf
-
(2002)
-
-
Karygiannis, T.1
Owens, L.2
-
22
-
-
16244367428
-
Wireless LAN security and IEEE 802. 11i
-
J. C. CHEN, M. C. JIANG, Y. W. LIU, Wireless LAN security and IEEE 802. 11i. IEEE Wireless Communications, (2005), vol. 12, no. 1, pp. 27-36
-
(2005)
IEEE Wireless Communications
, vol.12
, Issue.1
, pp. 27-36
-
-
Chen, J.C.1
Jiang, M.C.2
Liu, Y.W.3
-
24
-
-
85040654532
-
Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802. 11 Networks
-
G. RUPINDE, S. JASON, C. ANDREW, Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802. 11 Networks. Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Vol. 54, pp. 221-230, (2006)
-
(2006)
Proceedings of the 2006 Australasian workshops on Grid computing and e-research
, vol.54
, pp. 221-230
-
-
Rupinde, G.1
Jason, S.2
Andrew, C.3
-
25
-
-
84860573935
-
-
Honours Project, School of Computer Science, Carleton University
-
L. HAN, A Threat Analysis of The Extensible Authentication Protocol. Honours Project, School of Computer Science, Carleton University, (2006). http://www. scs. carleton. ca/barbeau/Honours/Lei Han. pdf
-
(2006)
A Threat Analysis of The Extensible Authentication Protocol
-
-
Han, L.1
-
26
-
-
85040657216
-
-
802. 11i: Robust and ready to go
-
L. PHIFER, 802. 11i: Robust and ready to go. (2004). http://searchmobilecomputing. techtarget. com/tip/1,289483,sid40 gci992741,00. html
-
(2004)
-
-
Phifer, L.1
-
27
-
-
85040701979
-
-
802. 11i (How we got here and where are we headed). Orlando
-
E. PEREZ, 802. 11i (How we got here and where are we headed). Orlando, (2004). http://www. giac. org/practical/GSEC/Elio Perez GSEC. pdf
-
(2004)
-
-
Perez, E.1
-
28
-
-
85040706877
-
-
FIPS Pub197: Advanced Encryption Standard (AES)
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, FIPS Pub197: Advanced Encryption Standard (AES), (2001)
-
(2001)
-
-
-
30
-
-
28344453256
-
-
Laguna Hills, CA: Aegean Park Press
-
I. KUMAR, Cryptology. Laguna Hills, CA: Aegean Park Press, (1997)
-
(1997)
Cryptology
-
-
Kumar, I.1
-
32
-
-
85040670285
-
-
U. S. DoC/NIST, November 26
-
FIPS PUBLICATION 197, Advanced Encryption Standard (AES). U. S. DoC/NIST, November 26, (2001)
-
(2001)
-
-
-
34
-
-
85040703050
-
-
AES Proposal: Rijndael, Version 2. Submission to NIST, March
-
J. DAEMEN, V. RIJMEN, AES Proposal: Rijndael, Version 2. Submission to NIST, March (1999). http://csrc. nist. gov/encryption/aes
-
(1999)
-
-
Daemen, J.1
Rijmen, V.2
|