+

Walker, 2000 - Google Patents

IEEE P802. 11

Walker, 2000

View PDF
Document ID
1009812299797699118
Author
Walker J
Publication year

External Links

Snippet

Abstract The IEEE 802.11 standard [1] defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. The goal of WEP is to provide data privacy to the level of a wired network. The 802.11 design community generally concedes that the WEP …
Continue reading at www.alti.at (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Frankel et al. The aes-cbc cipher algorithm and its use with ipsec
Bellare et al. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
Borisov et al. Intercepting mobile communications: The insecurity of 802.11
Karn et al. The esp des-cbc transform
Baugher et al. The secure real-time transport protocol (SRTP)
Gupta et al. Security analysis of voice-over-IP protocols
US8462943B2 (en) Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
US20060159260A1 (en) Method and communication system employing secure key exchange for encoding and decoding messages between nodes of a communication network
Schneier et al. Cryptanalysis of microsoft’s PPTP authentication extensions (MS-CHAPv2)
US20060008082A1 (en) System and method for securing communications between devices
Blumenthal et al. The advanced encryption standard (AES) cipher algorithm in the SNMP user-based security model
Wool A note on the fragility of the" Michael" message integrity code
Paterson et al. Plaintext-dependent decryption: A formal security treatment of SSH-CTR
Lauridsen Design and analysis of symmetric primitives
Aayush et al. Understanding SSL protocol and its cryptographic weaknesses
US20020089979A1 (en) Communication security
Petroni et al. The dangers of mitigating security design flaws: a wireless case study
Klima et al. Side channel attacks on CBC encrypted messages in the PKCS# 7 format
Yao et al. Enhancing RC4 algorithm for WLAN WEP protocol
Caneill et al. Attacks against the WiFi protocols WEP and WPA
Walker IEEE P802. 11
Mattsson Collision-Based Attacks on Block Cipher Modes-Exploiting Collisions and Their Absence
Handschuh et al. Minding your MAC algorithms
Frankel et al. RFC3602: The AES-CBC Cipher Algorithm and Its Use with IPsec
Vaarala et al. Attacking predictable IPsec ESP initialization vectors
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载