A. Benamrane

  • Citations Per Year
Learn More
An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without(More)
  • 1