Login / Signup
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
Kazukuni Kobara
Hideki Imai
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2006)
Keyphrases
</>
secret key
sufficient conditions
pattern mining
wireless sensor networks
similarity search
frequent patterns