

Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
Publisher: IGI Global_journal
E-ISSN: 1548-064x|1|3|59-83
ISSN: 1548-0631
Source: International Journal of Business Data Communications and Networking (IJBDCN), Vol.1, Iss.3, 2005-07, pp. : 59-83
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content







