On enhancing the WEP security against brute-force and compromised keys.
Saif ur RehmanSaeed UllahSardar AliPublished in: CISIM (2010)
Keyphrases
- brute force
- secret key
- stream cipher
- security mechanisms
- key agreement
- private key
- key management
- wireless local area network
- smart card
- encryption scheme
- hash functions
- security issues
- diffie hellman
- key establishment
- key distribution
- authentication scheme
- authentication protocol
- security requirements
- information security
- computationally expensive
- access control
- exhaustive search
- security analysis
- computer chess
- ciphertext
- resource constrained
- security protocols
- network security
- wireless networks
- public key
- rfid tags
- operating system
- intrusion detection
- lower bound
- image encryption
- security policies
- high security
- key agreement protocol
- wireless sensor networks