Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,556 papers from all fields of science
Search
Sign In
Create Free Account
Temporal Key Integrity Protocol
Known as:
TKIP
Temporal Key Integrity Protocol or TKIP /tiːˈkɪp/ was a stopgap security protocol used in the IEEE 802.11 wireless networking standard. TKIP was…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Cracking of wireless networks
Extensible Authentication Protocol
IEEE 802.11i-2004
IP camera
Expand
Broader (2)
Key management
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
How TKIP Induces Biases of Internal States of Generic RC4
Ryoma Ito
,
A. Miyaji
Australasian Conference on Information Security…
2015
Corpus ID: 30774818
RC4, designed by Rivest, is widely used including WPA, which is one of the security protocols for IEEE 802.11 wireless standard…
Expand
2012
2012
Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security
M. R. Doomun
,
K. Soyjaudah
International Conference on Security and…
2012
Corpus ID: 15312086
Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi solution for the security loop holes present in the already widely…
Expand
2010
2010
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
Martin Eian
Cryptology and Network Security
2010
Corpus ID: 14154281
This paper proposes a highly efficient cryptographic denial of service attack against 802.11 networks using 802.11i TKIP and CCMP…
Expand
2007
2007
WEP-based security management in IEEE 802.11 wireless sensor networks
Vincent Guyot
3rd IEEE/IFIP International Conference in Central…
2007
Corpus ID: 18777535
With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this…
Expand
2007
2007
Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP
Jun-Dian Lee
,
Chih-Peng Fan
International Symposium on Intelligent Signal…
2007
Corpus ID: 16613510
In this paper, novel low-latency RC4 implementations with cell-based VLSI design flow are proposed for IEEE 802. Hi WEP/TKIP. The…
Expand
2006
2006
Study on Analysis of Temporal Key Integrity Protocol
Xu En-wang
2006
Corpus ID: 63184899
In a black-box model,TKIP(Temporal Key Integrity Protocol) can be crypt-analyzed for wireless network security.According to the…
Expand
2006
2006
Secure enhanced wireless transfer protocol
Jin-Cherng Lin
,
Yu-Hsin Kao
,
Chengjin Yang
ARES
2006
Corpus ID: 9124088
When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more…
Expand
2006
2006
Analyzing Wireless LAN Security Overhead
H. L. McCarter
2006
Corpus ID: 46266582
2005
2005
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations
A. Woodward
Australian Information Security Management…
2005
Corpus ID: 18076925
Since their inception, 802.11 wireless networks have been plagued by a wide range of security problems. These problems relate to…
Expand
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE