-
1
-
-
84864376709
-
-
Retrieved 4 Februari, 2013, from
-
M. Beck. Enhanced TKIP michael attacks. Retrieved 4 Februari, 2013, from http://download.aircrack-ng.org/wiki-files/doc/enhanced-tkip-michael.pdf.
-
Enhanced TKIP Michael Attacks
-
-
Beck, M.1
-
5
-
-
38849204787
-
Discovering and exploiting 802.11 wireless driver vulnerabilities
-
DOI 10.1007/s11416-007-0065-x, SSTIC 2007 Special Issue
-
L. Butti and J. Tinnés. Discovering and exploiting 802.11 wireless driver vulnerabilities. Journal in Computer Virology, 4(1):25-37, 2008. (Pubitemid 351207806)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 25-37
-
-
Butti, L.1
Tinnes, J.2
-
10
-
-
52049102462
-
Wireless networks security: Proof of chopchop attack
-
M. Guennoun, A. Lbekkouri, A. Benamrane, M. Ben-Tahir, and K. El-Khatib. Wireless networks security: Proof of chopchop attack. In WOWMOM, pages 1-4, 2008.
-
(2008)
WOWMOM
, pp. 1-4
-
-
Guennoun, M.1
Lbekkouri, A.2
Benamrane, A.3
Ben-Tahir, M.4
El-Khatib, K.5
-
11
-
-
78650757225
-
An improved attack on TKIP
-
F. M. Halvorsen, O. Haugen, M. Eian, and S. F. Mjølsnes. An improved attack on TKIP. In 14th Nordic Conference on Secure IT Systems, NordSec '09, 2009.
-
14th Nordic Conference on Secure IT Systems, NordSec '09, 2009
-
-
Halvorsen, F.M.1
Haugen, O.2
Eian, M.3
Mjølsnes, S.F.4
-
12
-
-
0032645074
-
Review: TCP/IP security threats and attack methods
-
B. Harris and R. Hunt. Review: TCP/IP security threats and attack methods. Computer Communications, 22(10):885-897, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.10
, pp. 885-897
-
-
Harris, B.1
Hunt, R.2
-
13
-
-
33744936311
-
Security analysis of michael: The IEEE 802.11i message integrity code
-
J. Huang, J. Seberry, W. Susilo, and M. W. Bunder. Security analysis of michael: The IEEE 802.11i message integrity code. In EUC Workshops, pages 423-432, 2005.
-
(2005)
EUC Workshops
, pp. 423-432
-
-
Huang, J.1
Seberry, J.2
Susilo, W.3
Bunder, M.W.4
-
15
-
-
77951273497
-
Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard
-
B. Könings, F. Schaub, F. Kargl, and S. Dietzel. Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard. In LCN, 2009.
-
(2009)
LCN
-
-
Könings, B.1
Schaub, F.2
Kargl, F.3
Dietzel, S.4
-
16
-
-
33444473347
-
Weaknesses in the temporal key hash of WPA
-
V. Moen, H. Raddum, and K. J. Hole. Weaknesses in the temporal key hash of WPA. Mobile Computing and Communications Review, 8(2):76-83, 2004.
-
(2004)
Mobile Computing and Communications Review
, vol.8
, Issue.2
, pp. 76-83
-
-
Moen, V.1
Raddum, H.2
Hole, K.J.3
-
17
-
-
80155124131
-
Cryptanalysis for RC4 and breaking WEP/WPA-TKIP
-
M. Morii and Y. Todo. Cryptanalysis for RC4 and breaking WEP/WPA-TKIP. IEICE Transactions, 94-D(11), 2011.
-
(2011)
IEICE Transactions
, vol.94 D
, Issue.11
-
-
Morii, M.1
Todo, Y.2
-
18
-
-
0041469957
-
Collaborative QoS architecture between DiffServ and 802.11e wireless LAN
-
S. Park, K. Kim, D. Kim, S. Choi, and S. Hong. Collaborative QoS architecture between DiffServ and 802.11e wireless LAN. In Vehicular Technology Conference, 2003.
-
Vehicular Technology Conference, 2003
-
-
Park, S.1
Kim, K.2
Kim, D.3
Choi, S.4
Hong, S.5
-
19
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
-
A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2), 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.2
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
21
-
-
84856367072
-
Falsification attacks against WPA-TKIP in a realistic environment
-
Y. Todo, Y. Ozawa, T. Ohigashi, and M. Morii. Falsification attacks against WPA-TKIP in a realistic environment. IEICE Transactions, 95-D(2), 2012.
-
(2012)
IEICE Transactions
, vol.95 D
, Issue.2
-
-
Todo, Y.1
Ozawa, Y.2
Ohigashi, T.3
Morii, M.4
-
22
-
-
7544239419
-
A note on the fragility of the Michael message integrity code
-
A. Wool. A note on the fragility of the Michael message integrity code. IEEE Transactions on Wireless Communications, 3(5):1459-1462, 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.5
, pp. 1459-1462
-
-
Wool, A.1
|