Login / Signup

Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .

Kazukuni KobaraHideki Imai
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2006)
Keyphrases
  • secret key
  • sufficient conditions
  • pattern mining
  • wireless sensor networks
  • similarity search
  • frequent patterns