Documents Related by Co-Citation

175 Weaknesses in the Key Scheduling Algorithm of RC4 – Scott Fluhrer, Itsik Mantin, Adi Shamir - 2001
96 Using the Fluhrer, Mantin, and Shamir Attack to Break WEP – Adam Stubblefield, John Ioannidis, Aviel D. Rubin - 2001
648 Ariadne: A secure on-demand routing protocol for ad hoc networks – Yih-chun Hu - 2002
789 Wireless Ad Hoc Networks – Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, S. Sajama - 2002
65 Unsafe at any key size; An analysis of the WEP encapsulation – Jesse R. Walker, Submission Page Jesse Walker, Intel Corporation - 2000
388 SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks – Yih-Chun Hu, David B. Johnson, Adrian Perrig - 2003
29 An Inductive Chosen Plaintext Attack against WEP/WEP2”, doc – William A Arbaugh
125 Intrusion Detection Techniques for Mobile Wireless Networks – Yongguang Zhang, Wenke Lee, Yi-an Huang - 2003
455 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002
88 Problem Areas for the IP Security Protocols – Steven M. Bellovin - 1996
462 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
169 Securing ad hoc routing protocols – M G Zapata, N Asokan - 2002
781 The Applied Cryptography: Protocols, Algorithms, and Source Code – B Schneier - 1995
20 Security problems in 802.11-based networks – Russ Housley, William Arbaugh - 2003
160 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions – John Bellardo, Stefan Savage - 2003
78 Your 802.11 Wireless network has no clothes – William A. Arbaugh, Narendar Shankar, Y. C. Justin Wan - 2001
100 Detection and Handling of MAC Layer Misbehavior in Wireless Networks – Pradeep Kyasanur, Nitin H. Vaidya - 2002
143 SSH - Secure Login Connections over the Internet – Tatu Ylönen - 1996
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997