Attacks on IEEE 802.11 wireless networks
<p class="25Kljunereiposlerezimea"><em>Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initializatio...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Defence in Belgrade
2013-06-01
|
Series: | Vojnotehnički Glasnik |
Subjects: | |
Online Access: | http://aseestant.ceon.rs/index.php/vtg/article/view/2301 |