Information Technology Reference
In-Depth Information
[4] Berghel H., Uecker J., “WiFi attack vectors”, Commun. ACM 48 (8) (2005) 21-27.
[5] Fluhrer S., Mantin I., Shamir A., “Weakness in the key scheduling algorithm of RC4”,
http://www.cs.umd.edu/~waa/class-pubs/rc4_ksaproc.ps , 2001.
[6] Giller R., Bulliard A., Wired Equivalent Privacy , Swiss Institute of Technology, Lau-
sanne, 2004.
[7] Hulton D., “Practical exploitation of RC4 weaknesses in WEP environments”, http://
www.dachb0den.com/projects/bsd-airtools/wepexp.txt , 22 Feb. 2002.
[8] Meetinghouse Data Communications, “802.1X—still evolving as a standard”, http://
www.mtghouse.com/8021X.pdf , 28 Aug. 2004.
[9] Mikhailovsky A., Gavrilenko K., Vladimirov A., Wi-Foo: The Secrets of Wireless Hack-
ing , Addison-Wesley, Boston, 2004.
[10] Moskowitz R., “Weakness in passphrase choice in WPA interface”, http://wifinetnews.
com/archives/002452.html , 04 Nov. 2003.
[11] Newsham T., “Cracking WEP keys”, Presentation: Black Hat, 2001, http://www.
blackhat.com/presentations/bh-usa-01/TimNewsham/bh-usa-01-Tim-Newsham.ppt .
[12] Peikari C., Fogie S., Maximum Wireless Security , Sams Publishing, Indianapolis, 2002.
[13] Sankar S., Sundaralingam S., Balinsky A., Miller D., Cisco Wireless LAN Security ,Cisco
Press, Indianapolis, 2005.
[14] Schneier B., Mudge, “Cryptanalysis of Microsoft's PPTP authentication extensions (MS-
CHAPv2)”, http://www.schneier.com/paper-pptpv2.html , 19 Oct. 1999.
[15] Stevens R.W., TCP/IP Illustrated , vol. 1, Addison-Wesley, Boston, 1994.
[16] Strand
L.,
“802.1X
port-based
authentication
HOWTO”,
http://ldp.hughesjr.com/
HOWTO/8021X-HOWTO/intro.html , 18 Oct. 2004.
[17] Stubblefield A., Ioannidis J., Rubin A.D., “Using the Fluhrer, Mantin, and Shamir at-
tack to break WEP”, http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/
stubbl.pdf .
[18] Vladimirov A., Gavrilenko K., Mikhailovsky A., Wi-Foo , Addison-Wesley, Boston,
2004.
[19] Wright J., “Weaknesses in LEAP challenge/response”, Presentation: Defcon, 2003, http://
asleap.sourceforge.net/asleap-defcon.pdf .
Search WWH ::




Custom Search