Documents Related by Co-Citation

175 Weaknesses in the Key Scheduling Algorithm of RC4 – Scott Fluhrer, Itsik Mantin, Adi Shamir - 2001
96 Using the Fluhrer, Mantin, and Shamir Attack to Break WEP – Adam Stubblefield, John Ioannidis, Aviel D. Rubin - 2001
649 Ariadne: A secure on-demand routing protocol for ad hoc networks – Yih-chun Hu - 2002
789 Wireless Ad Hoc Networks – Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, S. Sajama - 2002
65 Unsafe at any key size; An analysis of the WEP encapsulation – Jesse R. Walker, Submission Page Jesse Walker, Intel Corporation - 2000
389 SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks – Yih-Chun Hu, David B. Johnson, Adrian Perrig - 2003
29 An Inductive Chosen Plaintext Attack against WEP/WEP2”, doc – William A Arbaugh
126 Intrusion Detection Techniques for Mobile Wireless Networks – Yongguang Zhang, Wenke Lee, Yi-an Huang - 2003
456 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002
88 Problem Areas for the IP Security Protocols – Steven M. Bellovin - 1996
461 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
170 Securing Ad Hoc Routing Protocols – M G Zapata, N Asokan - 2002
780 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition – Bruce Schneier - 1996
20 Security problems in 802.11-based networks – Russ Housley, William Arbaugh - 2003
160 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions – John Bellardo, Stefan Savage - 2003
78 Your 802.11 Wireless network has no clothes – William A. Arbaugh, Narendar Shankar, Y. C. Justin Wan - 2001
99 Detection and Handling of MAC Layer Misbehavior in Wireless Networks – Pradeep Kyasanur, Nitin H. Vaidya - 2002
143 SSH - Secure Login Connections over the Internet – Tatu Ylönen - 1996
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997