1A. Lashkari,M. Danesh,B. Samadi.A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on . 2009
2Lei Zhang,Jiang Yu,Zugao Deng,Renfei Zhang.The security analysis of WPA encryptionin wireless network. Consumer Electronics,Communications and Networks (CECNet),20122nd International Conference .
3Ying Wang,Zhigang Jin,Ximan Zhao.Practical Defence againstWEPandWPA-PSK AttackforWLAN. Wireless Communications Networking and Mobile Computing (WiCOM),20106th International Conference .
4Martin Beck,Erik Tews.Practical Attacks Against WEP and WPA. WiSec’’09Proceedings of the second ACM conference on Wireless network security . 2009
5Lei Zhang,Jiang Yu,Rong Zong,Jun Chang,Jin Xue.Prevention research of Cracking WPA-PSKkeybased on GPU. ConsumerElectronics,CommunicationsandNetworks (CECNet),20122nd International Conference .
6A. Lashkari,M. Danesh,B. Samadi.A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on . 2009
7Lei Zhang,Jiang Yu,Zugao Deng,Renfei Zhang.The security analysis of WPA encryptionin wireless network. Consumer Electronics,Communications and Networks (CECNet),20122nd International Conference .
8Ying Wang,Zhigang Jin,Ximan Zhao.Practical Defence againstWEPandWPA-PSK AttackforWLAN. Wireless Communications Networking and Mobile Computing (WiCOM),20106th International Conference .
9Martin Beck,Erik Tews.Practical Attacks Against WEP and WPA. WiSec’’09Proceedings of the second ACM conference on Wireless network security . 2009
10Lei Zhang,Jiang Yu,Rong Zong,Jun Chang,Jin Xue.Prevention research of Cracking WPA-PSKkeybased on GPU. ConsumerElectronics,CommunicationsandNetworks (CECNet),20122nd International Conference .
同被引文献8
1Lei Zhang, Jiang Yu, Rong Zong, et al.Prevention research ofCracking WPA-PSK key based on GPU[C].Consumer Electronics,Communications and Networks(CECNet), 2012 2nd InternationalConference : 1965-1959.
2Philippe Oechslin. Making a Faster Cryptanalytic Time-MemoryTrade-Off[C].Advances in Cryptology - CRYPTO 2003Volume2729 of the series Lecture Notes in Computer Science : 617-630.