Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
An investigation of unauthorised use of wireless networks in adelaide, south australia
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
Mitigating design flaws often provides the only means to pro0tect legacy equipment, particularly in wireless local area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack can facilitate another.