Walker, 2000 - Google Patents
IEEE P802. 11Walker, 2000
View PDF- Document ID
- 1009812299797699118
- Author
- Walker J
- Publication year
External Links
Snippet
Abstract The IEEE 802.11 standard [1] defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. The goal of WEP is to provide data privacy to the level of a wired network. The 802.11 design community generally concedes that the WEP …
- 238000005538 encapsulation 0 abstract description 32
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Frankel et al. | The aes-cbc cipher algorithm and its use with ipsec | |
| Bellare et al. | Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm | |
| Borisov et al. | Intercepting mobile communications: The insecurity of 802.11 | |
| Karn et al. | The esp des-cbc transform | |
| Baugher et al. | The secure real-time transport protocol (SRTP) | |
| Gupta et al. | Security analysis of voice-over-IP protocols | |
| US8462943B2 (en) | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |
| US20060159260A1 (en) | Method and communication system employing secure key exchange for encoding and decoding messages between nodes of a communication network | |
| Schneier et al. | Cryptanalysis of microsoft’s PPTP authentication extensions (MS-CHAPv2) | |
| US20060008082A1 (en) | System and method for securing communications between devices | |
| Blumenthal et al. | The advanced encryption standard (AES) cipher algorithm in the SNMP user-based security model | |
| Wool | A note on the fragility of the" Michael" message integrity code | |
| Paterson et al. | Plaintext-dependent decryption: A formal security treatment of SSH-CTR | |
| Lauridsen | Design and analysis of symmetric primitives | |
| Aayush et al. | Understanding SSL protocol and its cryptographic weaknesses | |
| US20020089979A1 (en) | Communication security | |
| Petroni et al. | The dangers of mitigating security design flaws: a wireless case study | |
| Klima et al. | Side channel attacks on CBC encrypted messages in the PKCS# 7 format | |
| Yao et al. | Enhancing RC4 algorithm for WLAN WEP protocol | |
| Caneill et al. | Attacks against the WiFi protocols WEP and WPA | |
| Walker | IEEE P802. 11 | |
| Mattsson | Collision-Based Attacks on Block Cipher Modes-Exploiting Collisions and Their Absence | |
| Handschuh et al. | Minding your MAC algorithms | |
| Frankel et al. | RFC3602: The AES-CBC Cipher Algorithm and Its Use with IPsec | |
| Vaarala et al. | Attacking predictable IPsec ESP initialization vectors |