Limpar
107 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Nick L. Petroni, William A. Arbaugh,

... area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack ...

Tópico(s): RFID technology advancements

2003 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy

Artigo Revisado por pares

Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Makoto Ikeda, Leonard Barolli,

... analyse the optimised link state routing (OLSR) and wired equivalent privacy (WEP) protocol in an indoor scenario, and mean ...

Tópico(s): IoT and Edge/Fog Computing

2017 - | International Journal of Space-Based and Situated Computing

Artigo Revisado por pares

Tetsuya Oda, Keita Matsuo, Leonard Barolli, Masafumi Yamada, Yi Liu,

... performance of Optimised Link State Routing (OLSR) and Wired Equivalent Privacy (WEP) protocol in an indoor scenario. For evaluation ...

Tópico(s): IoT and Edge/Fog Computing

2017 - | International Journal of Web and Grid Services

Artigo Acesso aberto

S. A. Alhumrani, Jayaprakash Kar,

... Secure Shell Protocol, Internet Protocol Security (IPSec), Kerberos, Wired Equivalent Privacy (WEP) and WiFi Protected Access(WPA) and discuss ...

Tópico(s): Advanced Authentication Protocols Security

2016 - Science and Engineering Research Support Society | International Journal of Security and Its Applications

Artigo Acesso aberto Revisado por pares

Asim F. Choudhri, Arindam Chatterjee, Ramin Javan, Martin G. Radvany, George Shih,

... cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components ...

Tópico(s): Cardiovascular and Diving-Related Complications

2015 - Radiological Society of North America | Radiographics

Artigo Acesso aberto Revisado por pares

Tyler Johnson, Daniel Roggow, Phillip H. Jones, Joseph Zambreno,

... has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2015 - World Scientific | Journal of Circuits Systems and Computers

Revisão

Umesh Kumar, Sapna Gambhir,

... wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi- ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2014 - | International Journal of Future Generation Communication and Networking

Artigo Acesso aberto

Lazar Stоšić, Milena Bogdanović,

... operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802. ...

Tópico(s): Chaos-based Image/Signal Encryption

2012 - Science and Information Organization | International Journal of Advanced Computer Science and Applications

Artigo Acesso aberto Revisado por pares

Masakatu Morii, Yosuke Todo,

... Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key ...

Tópico(s): Wireless Networks and Protocols

2011 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Information and Systems

Artigo Revisado por pares

Li Wang, Bala Srinivasan, Nandita Bhattacharjee,

... the replacement of the old security standard named Wired Equivalent Privacy (WEP), and it aims to eliminate all known ...

Tópico(s): Cryptography and Data Security

2011 - Academy Publisher | Journal of Networks

Artigo Revisado por pares

Teramura Ryoichi, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii,

Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should ...

Tópico(s): Network Security and Intrusion Detection

2010 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

Artigo

Ying-Sung Lee, Hsien-Te Chien, Wen-Nung Tsai,

IEEE 802.11 networks are insecure. Wired Equivalent Privacy (WEP), the security mechanism used in 802.11, was proved to be vulnerable. IEEE 802.11i, the security enhancement, concentrates only on ...

Tópico(s): Mobile Ad Hoc Networks

2009 - Institute of Information Science | Journal of information science and engineering

Artigo Acesso aberto Revisado por pares

Radomir Prodanović, Dejan Simić,

... for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its ...

Tópico(s): Mobile Ad Hoc Networks

2007 - Faculty of Electrical Engineering and Computing, University of Zagreb | Journal of Computing and Information Technology

Artigo Revisado por pares

Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas,

... encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on ...

Tópico(s): Advanced Wireless Network Optimization

2007 - Elsevier BV | Computer Communications

Artigo

Ezedin Barka, Mohammed Boulmalf,

... encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2007 - International Communication Association | Journal of Communications

Artigo

Chetan Nanjunda Mathur, K. P. Subbalakshmi,

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although ...

Tópico(s): Advanced Authentication Protocols Security

2007 - | International journal of network security

Artigo Revisado por pares

Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan, Edilbert Kamal Dass,

Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE ...

Tópico(s): Mobile Ad Hoc Networks

2006 - Inderscience Publishers | International Journal of Wireless and Mobile Computing

Artigo

Neil Smyth, M. McLoone, J.V. McCanny,

... instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher ...

Tópico(s): Advanced Authentication Protocols Security

2006 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications

Artigo

Kevin Curran, Elaine Smyth,

Abstract On the surface, wireless networks act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based on radio communications technology, as an alternative to structured wiring and cables. Data is transmitted between devices through the air via the radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means ...

Tópico(s): Bluetooth and Wireless Communication Technologies

2006 - Taylor & Francis | Information Systems Security

Capítulo de livro Revisado por pares

Emmanuel López-Trejo, Francisco Rodríguez‐Henríquez, Arturo Díaz-Pérez,

... techniques have been proposed for replacing the broken Wired Equivalent Privacy (WEP) protocol, which arguably is the most widely ...

Tópico(s): Coding theory and cryptography

2006 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Adam Stubblefield, John P. A. Ioannidis, Aviel D. Rubin,

In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is completely ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2004 - Association for Computing Machinery | ACM Transactions on Information and System Security

Artigo Revisado por pares

Yasir Zahur, T. Andrew Yang,

... level of security must be guaranteed. The WEP (Wired Equivalent Privacy) protocol, originally proposed as the security mechanism of ...

Tópico(s): Advanced Malware Detection Techniques

2004 - Consortium for Computing Sciences in Colleges | Journal of computing sciences in colleges

Artigo Revisado por pares

Avishai Wool,

... incorporate a cryptographic message integrity code into its wired equivalent privacy (WEP) protocol, and relied upon CRC-32 for ...

Tópico(s): Wireless Networks and Protocols

2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications

Capítulo de livro Acesso aberto Revisado por pares

Scott Fluhrer, Itsik Mantin, Adi Shamir,

... operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802. ...

Tópico(s): Cryptography and Data Security

2001 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Kazukuni Kobara, Hideki Imai,

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2008 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Communications

Artigo Revisado por pares

Kazukuni Kobara,

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2006 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

Artigo Acesso aberto

Vipin Poddar, Hitesh Choudhary,

... about the disadvantages of wireless security protocols.WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust ...

Tópico(s): Network Packet Processing and Optimization

2014 - | International Journal on AdHoc Networking Systems

Capítulo de livro

Shubh Gupta, Oroos Arshi, Ambika Aggarwal,

... when data is in transit. Also WEP/WPA (wired equivalent privacy/ wireless protected access) cracking tools are taken care ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2023 - IGI Global | Advances in information security, privacy, and ethics book series

Artigo Revisado por pares

Remigius Chidiebere Diovu, John T. Agee,

... congestion scenario. Stochastic TCP congestion management schemes with wired equivalent privacy (WEP) and the Data Minimizing Function (DMF) scheme ...

Tópico(s): Security in Wireless Sensor Networks

2018 - | International journal of engineering research in Africa

Artigo Revisado por pares

Amar Kumar Mohapatra, Nupur Prakash,

... Therefore, many proposals dealt with security holes in Wired Equivalent Privacy protocol (WEP). In this paper, we analyze WEP ...

Tópico(s): Cryptographic Implementations and Security

2010 - Taylor & Francis | Journal of Discrete Mathematical Sciences and Cryptography