The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tkip with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2010 (15) 2011-2021 (13)
Publication types (Num. hits)
article(10) inproceedings(18)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 15 keywords

Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
140Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang Secure Enhanced Wireless Transfer Protocol. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP
76Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes An Improved Attack on TKIP. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
76Stephen Mark Glass, Vallipuram Muthukkumarasamy A Study of the TKIP Cryptographic DoS Attack. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68Avishai Wool A note on the fragility of the "Michael" message integrity code. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Erik Tews, Martin Beck Practical attacks against WEP and WPA. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip
50Aftab Ahmad, Mona El-Kadi, Stephan Olariu Common data security network (CDSN). Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP
45Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Ryoma Ito 0001, Atsuko Miyaji New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31Raman Kumar Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef Practical Side-Channel Attacks against WPA-TKIP. Search on Bibsonomy AsiaCCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Mathy Vanhoef, Frank Piessens All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2016 DBLP  BibTeX  RDF
31Mathy Vanhoef, Frank Piessens All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
31Ryoma Ito 0001, Atsuko Miyaji How TKIP Induces Biases of Internal States of Generic RC4. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Martin Beck Enhanced TKIP Michael Attacks. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
31Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt Plaintext Recovery Attacks Against WPA/TKIP. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt Plaintext Recovery Attacks Against WPA/TKIP. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
31Mathy Vanhoef, Frank Piessens Practical verification of WPA-TKIP vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii Falsification Attacks against WPA-TKIP in a Realistic Environment. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31M. Razvi Doomun, K. M. Sunjiv Soyjaudah LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
31Masakatu Morii, Yosuke Todo Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Martin Eian A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Wei Han, Dong Zheng 0001, Kefei Chen Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
27Andrew Gin, Ray Hunt Performance analysis of evolving wireless IEEE 802.11 security architectures. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i
27Carsten Maple, Helen Jacobs, Matthew Reeve Choosing the Right Wireless LAN Security Protocol for the Home and Business User. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, WLANs, WEP, WPA, TKIP
27Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole Weaknesses in the temporal key hash of WPA. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MIC, Michael, temporal key hash, 802.11, WPA, TKIP
23Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF decentralized access control, identity privacy, mobile privacy, location privacy, wireless security
Displaying result #1 - #28 of 28 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license