Sciweavers

6 search results - page 2 / 2
» The Phish-Market Protocol: Securely Sharing Attack Data betw...
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
13 years 6 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia