|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 15 keywords
|
|
|
Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
140 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
76 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
76 | Stephen Mark Glass, Vallipuram Muthukkumarasamy |
A Study of the TKIP Cryptographic DoS Attack. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park |
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem. |
ASP-DAC |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
50 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN). |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
45 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Ryoma Ito 0001, Atsuko Miyaji |
New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Raman Kumar |
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography. |
Wirel. Pers. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
Practical Side-Channel Attacks against WPA-TKIP. |
AsiaCCS |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Mathy Vanhoef, Frank Piessens |
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. |
USENIX Annual Technical Conference |
2016 |
DBLP BibTeX RDF |
|
31 | Mathy Vanhoef, Frank Piessens |
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. |
USENIX Security Symposium |
2015 |
DBLP BibTeX RDF |
|
31 | Ryoma Ito 0001, Atsuko Miyaji |
How TKIP Induces Biases of Internal States of Generic RC4. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Martin Beck |
Enhanced TKIP Michael Attacks. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
31 | Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt |
Plaintext Recovery Attacks Against WPA/TKIP. |
FSE |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt |
Plaintext Recovery Attacks Against WPA/TKIP. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
31 | Mathy Vanhoef, Frank Piessens |
Practical verification of WPA-TKIP vulnerabilities. |
AsiaCCS |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii |
Falsification Attacks against WPA-TKIP in a Realistic Environment. |
IEICE Trans. Inf. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
31 | M. Razvi Doomun, K. M. Sunjiv Soyjaudah |
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network |
CoRR |
2012 |
DBLP BibTeX RDF |
|
31 | Masakatu Morii, Yosuke Todo |
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. |
IEICE Trans. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Wei Han, Dong Zheng 0001, Kefei Chen |
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
27 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
27 | Carsten Maple, Helen Jacobs, Matthew Reeve |
Choosing the Right Wireless LAN Security Protocol for the Home and Business User. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
security, WLANs, WEP, WPA, TKIP |
27 | Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole |
Weaknesses in the temporal key hash of WPA. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
MIC, Michael, temporal key hash, 802.11, WPA, TKIP |
23 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla |
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
decentralized access control, identity privacy, mobile privacy, location privacy, wireless security |
Displaying result #1 - #28 of 28 (100 per page; Change: )
|
|