Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar |
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 409-414, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Andrea Bittau, Mark Handley, Joshua Lackey |
The Final Nail in WEP's Coffin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 386-400, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
91 | Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle |
A performance analysis of the spring protocol through simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 356-361, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
SPRiNG, network simulation, wireless security, OPNET, WEP |
75 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 Bit WEP in Less Than 60 Seconds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 188-202, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 319-332, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
wired equivalent privacy, Wireless security |
67 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 79-86, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
67 | Mohammad Saleh, Iyad Al Khatib |
Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Systems Communications ![In: Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 14-17 August 2005, Montreal, Canada, pp. 68-72, 2005, IEEE Computer Society, 0-7695-2422-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IEEE802.11b, security, sensor networks, performance, Ad hoc, WEP |
59 | Songhe Zhao, Charles A. Shoniregun |
Critical Review of Unsecured WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCW ![In: 2007 IEEE International Conference on Services Computing - Workshops (SCW 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 368-374, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii |
FMS Attack-Resistant WEP Implementation Is Still Broken. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 17-26, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 344-359, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
58 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 536-543, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
57 | Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang |
The Implementation of a Proactive Wireless Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 581-586, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Wireless Intrusion Detection System (WIDS), Wired Equivalent Privacy (WEP), 802.11, Short Message Service (SMS), Wireless Local Area Network (WLAN) |
49 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 3(5), pp. 1459-1462, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 395-411, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
42 | Chi Hyung In, Choong Seon Hong, Il Gyu Song |
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 792-801, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 62-67, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
41 | Jon Allen, Jeff Wilson |
Securing a wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 213-215, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
33 | Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani |
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 171-175, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Windows operating system, performance, wireless, throughput, encryption, response time |
33 | Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani |
The impact of wireless LAN security on performance of different Windows operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 260-264, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 123-127, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Sabine Kebreau, Barbu Constantinescu, Samuel Pierre |
A New Security Approach for WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1801-1804, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Avishai Wool |
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 11(6), pp. 677-686, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, authentication |
33 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 346-357, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 322-334, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka |
DRKH: A Power Efficient Encryption Protocol forWireless Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 822-829, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Power Devices, Dynamic Re-keying, Key Hopping, Authentication, WLAN Security |
33 | Nikita Borisov, Ian Goldberg, David A. Wagner 0001 |
Intercepting mobile communications: the insecurity of 802.11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001., pp. 180-189, 2001, ACM, 1-58113-422-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Ren-Zun Lian, Xing-Yue Guo |
Work-Energy Principle (WEP)-Based Characteristic Mode Theory for Wireless Power Transfer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 8th International Conference on Computer and Communication Systems, ICCCS 2023, Guangzhou, China, April 21-23, 2023, pp. 623-632, 2023, IEEE, 978-1-6654-5612-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhengqiao Lu |
基于混沌和WEP的无线传感器网络加密研究 (Encryption of Wireless Sensor Networks Based on Chaos and WEP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 46(6A), pp. 362-364, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Performance Evaluation of IEEE 802.11a 54 Mbps WEP Multi-Node Laboratory Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 11th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2018, Budapest, Hungary, July 18-20, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-1335-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuhei Watanabe, Takahiro Iriyama, Masakatu Morii |
Proposal of WEP Operation with Strong IV and Its Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 25, pp. 288-295, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Laboratory performance measurements of IEEE 802.11 a WEP PTMP links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 10th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2016, Prague, Czech Republic, July 20-22, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-2526-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Masafumi Yamada, Tetsuya Oda, Yi Liu 0011, Masahiro Hiyama, Keita Matsuo, Leonard Barolli |
Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016, Fukuoka, Japan, July 6-8, 2016, pp. 335-341, 2016, IEEE Computer Society, 978-1-5090-0984-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Cerstin Mahlow |
C-WEP―Rich Annotated Collection of Writing Errors by Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, Portorož, Slovenia, May 23-28, 2016., 2016, European Language Resources Association (ELRA). The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Tornado Attack on RC4 with Applications to WEP & WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 254, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Mattia D'Antonio, Paolo D'Onorio De Meo, Daniele Paoletti, Berardino Elmi, Matteo Pallocca, Nico Sanna, Ernesto Picardi, Graziano Pesole, Tiziana Castrignanò |
WEP: a high-performance analysis pipeline for whole-exome data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Bioinform. ![In: BMC Bioinform. 14(S-7), pp. S11, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Rafik Chaabouni |
Break WEP Faster with Statistical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 425, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Smashing WEP in a Passive Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers, pp. 155-178, 2013, Springer, 978-3-662-43932-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah |
WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1207.3882, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
26 | T. Tsukaune, Yosuke Todo, Masakatu Morii |
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012, pp. 25-30, 2012, IEEE Computer Society, 978-0-7695-4776-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Masakatu Morii, Yosuke Todo |
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 94-D(11), pp. 2087-2094, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
TCP, UDP and FTP Performances of Laboratory Wi-Fi IEEE 802.11g WEP Point-to-Point Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CENTERIS (2) ![In: ENTERprise Information Systems - International Conference, CENTERIS 2011, Vilamoura, Portugal, October 5-7, 2011, Proceedings, Part II, pp. 188-195, 2011, Springer, 978-3-642-24354-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii |
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1), pp. 164-171, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mustafa ElGili, Samani A. Talab, Awad H. Ali |
WEP and WPA Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Sens. Netw. ![In: Wirel. Sens. Netw. 2(3), pp. 239-242, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
A contribution to laboratory performance measurements of IEEE 802.11 a/g WEP point-to-point links using TCP, UDP and FTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: Proceedings of the 7th International Symposium on Communication Systems Networks and Digital Signal Processing, CSNDSP 2010, University of Northumbria at Newcastle, UK, 21-23 July 2010, pp. 867-870, 2010, IEEE, 978-1-86135-369-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
A Contribution to Laboratory Performance Measurements of IEEE 802.11 B, G WEP Point-to-Point Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINSYS ![In: WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26 - 28, 2010, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 165-168, 2010, SciTePress, 978-989-8425-24-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
26 | Saif ur Rehman, Saeed Ullah, Sardar Ali |
On enhancing the WEP security against brute-force and compromised keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010, pp. 250-254, 2010, IEEE, 978-1-4244-7817-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Taskin Koçak, Mohit Jagetia |
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 31(14), pp. 3405-3409, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
IVs to Skip for Immunizing WEP against FMS Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 91-B(1), pp. 164-171, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar, K. Vaithiyanathan |
Modified WEP key management for enhancing WLAN security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 1(3/4), pp. 437-452, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Martin Beck, Erik Tews |
Practical attacks against WEP and WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 472, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
26 | Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel |
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 9, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Bogdan Crainicu, Florian Mircea Boian |
KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TeNe ![In: Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Connecticut, USA, pp. 391-396, 2008, Springer, 978-90-481-3661-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Longjun Zhang, Tao Zou |
An Improved Key Management Scheme for WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 234-239, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Erik Tews |
Attacks on the WEP protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 471, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 bit WEP in less than 60 seconds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 120, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Therverson Kanavathy |
Security Flaws in WEP Data Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWN ![In: Proceedings of the 2007 International Conference on Wireless Networks, June 25-28, 2007, Las Vegas, Nevada, USA, pp. 199-208, 2007, CSREA Press, 1-60132-039-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Kevin Curran, Elaine Smyth |
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 15(4), pp. 17-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Radomir Prodanovic, Dejan Simic |
Holistic approach to Wep protocol in securing wireless network infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Inf. Syst. ![In: Comput. Sci. Inf. Syst. 3(2), pp. 97-113, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(8), pp. 2198-2206, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
A hybrid cryptosystem based on WEP for 802.11 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Methods Sci. Eng. ![In: J. Comput. Methods Sci. Eng. 6(5-6), pp. 359-377, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jin-Cherng Lin, Yu-Hsin Kao |
Burglarproof WEP Protocol on Wireless Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: Pacific Asia Conference on Information Systems, PACIS 2006, Kuala Lumpur, Malaysia, July 6-9, 2006, pp. 9, 2006, AISeL. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
Securing wireless networks with enhanced WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAINE ![In: Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006, November 13-15, 2006, Las Vegas, Nevada, USA, pp. 358-363, 2006, ISCA, 978-1-880843-61-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha, Joohan Lee |
An IV Collision Avoidance Algorithm - Strengthening the WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWN ![In: Proceedings of the 2005 International Conference on Wireless Networks, ICWN 2005, Las Vegas, Nevada, USA, June 27-30, 2005, pp. 73-78, 2005, CSREA Press, 1-932415-55-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha |
Enhancing Message Privacy in WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Information Systems ![In: Wireless Information Systems, Proceedings of the 4th International Workshop on Wireless Information Systems, WIS 2005, In conjunction with ICEIS 2005, Miami, USA, May 2005, pp. 23-32, 2005, INSTICC Press. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
26 | Wen-Chuan Hsieh, Yi-Hsien Chiu, Chi-Chun Lo |
An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain, pp. 127-138, 2004, Springer, 978-0-387-23197-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz |
Analysis of WEP Performance on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004, pp. 324-331, 2004, INSTICC Press, 972-8865-07-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
26 | Giannis Pikrammenos, Ghassan Sarkis, John Soldatos 0001, Vasilios Anagnostopoulos |
Hidden Layer Authentication using Smart Card for WEP-based WLANS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece, pp. 447-451, 2003, Kluwer, 1-4020-7449-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
26 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2002, San Diego, California, USA, 2002, The Internet Society, 1-891562-14-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
26 | Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen 0001, Jukka Saarinen |
Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSIPCO ![In: 10th European Signal Processing Conference, EUSIPCO 2000, Tampere, Finland, September 4-8, 2000, pp. 1-4, 2000, IEEE, 978-952-1504-43-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
26 | Dimitris Christodoulakis, Grammati E. Pantziou |
WEP - a workstation for education in programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 8(5), pp. 401-408, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
26 | M. Devos, Geert Adriaens, Yves D. Willems |
The Parallel Expert Parser (PEP): a thoroughly revised descendent of the Word Expert Parser (WEP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLING ![In: Proceedings of the 12th International Conference on Computational Linguistics, COLING '88, Budapest, Hungary, August 22-27, 1988, pp. 142-147, 1988, John von Neumann Society for Computing Sciences, Budapest, 963-8431-56-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
26 | Geert Adriaens |
WEP (Word Expert Parsing) Revised and Applied to Dutch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: Advances in Artificial Intelligence II, Seventh European Conference on Artificial Intelligence, ECAI 1986, Brighton, UK, July 20-25, 1986, Proceedings., pp. 403-416, 1986, North-Holland, 0-444-70279-2. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP BibTeX RDF |
|
25 | Subhasis Mukherjee, Maynul Hasan, Belal Chowdhury, Morshed U. Chowdhury |
Security of RFID Systems - A Hybrid Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel & Distributed Computing, SNPD 2011, Sydney, Australia, July 6-8, 2011, pp. 58-63, 2011, IEEE Computer Society, 978-1-4577-0896-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
IV, RFID, RSA, SCM, WEP |
25 | Gh. Rasool Begh, Ajaz Hussain Mir |
Quantification of the Effect of Security on Performance in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 57-62, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA |
25 | Carsten Maple, Helen Jacobs, Matthew Reeve |
Choosing the Right Wireless LAN Security Protocol for the Home and Business User. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 1025-1032, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, WLANs, WEP, WPA, TKIP |
25 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 723-729, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
25 | Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane |
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 145-152, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WinCE, ActiveSync, security, wireless, vulnerability, WEP, 802.11b |
24 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 273-277, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
16 | Jie Xiong 0001, Kyle Jamieson |
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 415-416, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SecureAngle, wireless, 802.11, angle of arrival |
16 | Bo Yan, Guanling Chen, Jie Wang 0002, Hongda Yin |
Robust Detection of Unauthorized Wireless Access Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 14(4), pp. 508-522, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, IEEE 802.11, wireless security, rogue AP |
16 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 101, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
16 | Hongda Yin, Guanling Chen, Jie Wang 0002 |
Detecting protected layer-3 rogue APs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: Fourth International Conference on Broadband Communications, Networks and Systems, (BROADNETS 2007), 10-14 September 2007, Raleigh, North-Carolina, USA, pp. 449-458, 2007, IEEE, 978-1-4244-1432-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith |
Laboratory modules for conducting comparative analysis of 802.11 frames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007, pp. 225-232, 2007, ACM, 978-1-59593-920-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless networking education, information technology education |
16 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 619-628, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dong Phil Kim, Seok Joo Koh, Sang Wook Kim |
An Integrated Scheme for Intrusion Detection in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 723-732, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero |
Spontaneous networks: Trust in a world of equals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 42, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 223-232, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(7), pp. 28-34, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
16 | Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay |
Measuring energy-security tradeoffs in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 293-302, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine |
Privacy Vulnerabilities in Encrypted HTTP Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 1-11, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system in mobile wireless domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 24-30, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover |
16 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 25-35, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee |
Security Threats and Countermeasures in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Technologies for Advanced Heterogeneous Networks, First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings, pp. 168-182, 2005, Springer, 3-540-30884-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Stephen Michell, Kannan Srinivasan |
State based key hop protocol: a lightweight security protocol for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PE-WASUN ![In: Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN 2004, Venezia, Italy, October 4, 2004, pp. 112-118, 2004, ACM, 1-58113-959-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
low power security, state based encryption, wireless security, computer network security, wireless sensor network security |
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 711-721, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 1010-1019, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 370-375, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Florina Almenárez, Daniel Díaz Sánchez, Andrés Marín López |
Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 90-99, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
MobiCom poster: public-key-based secure Internet access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(1), pp. 44-46, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002, pp. 47-56, 2002, ACM, 1-58113-585-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |