Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,400,389 papers from all fields of science
Search
Sign In
Create Free Account
Temporal Key Integrity Protocol
Known as:
TKIP
Temporal Key Integrity Protocol or TKIP /tiːˈkɪp/ was a stopgap security protocol used in the IEEE 802.11 wireless networking standard. TKIP was…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Cracking of wireless networks
Extensible Authentication Protocol
IEEE 802.11i-2004
IP camera
Expand
Broader (2)
Key management
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Ankara İli Şartlarında Düşey Tip Toprak Kaynaklı Isı Pompası Sisteminin Enerji ve Ekserji Analizi
M. Özdemir
,
M. G. Özkaya
2015
Corpus ID: 191210405
Bu calismada, 20,7 m3’luk hacme sahip bir odayi isitmak ve sogutmak icin 40 m sondaj derinligine sahip dusey tip toprak kaynakli…
Expand
2012
2012
Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security
M. R. Doomun
,
K. Soyjaudah
International Conference on Security and…
2012
Corpus ID: 15312086
Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi solution for the security loop holes present in the already widely…
Expand
2009
2009
An integrated security model for WLAN
Ondiwa Nashon Odhiambo
,
1]E. Biermann
,
G. Noel
IEEE Region 8 Conference AFRICON
2009
Corpus ID: 7992682
IEEE802.11 wireless local Area Networks (WLAN) are widely deployed as extension to corporate wired LAN infrastructures. The…
Expand
2007
2007
WEP-based security management in IEEE 802.11 wireless sensor networks
Vincent Guyot
3rd IEEE/IFIP International Conference in Central…
2007
Corpus ID: 18777535
With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this…
Expand
2006
2006
Analyzing Wireless LAN Security Overhead
H. L. McCarter
2006
Corpus ID: 46266582
2006
2006
Study on Analysis of Temporal Key Integrity Protocol
Xu En-wang
2006
Corpus ID: 63184899
In a black-box model,TKIP(Temporal Key Integrity Protocol) can be crypt-analyzed for wireless network security.According to the…
Expand
2005
2005
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations
A. Woodward
Australian Information Security Management…
2005
Corpus ID: 18076925
Since their inception, 802.11 wireless networks have been plagued by a wide range of security problems. These problems relate to…
Expand
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
2004
2004
An efficient application of a dynamic crypto system in mobile wireless security
H. Soliman
,
M. Omari
IEEE Wireless Communications and Networking…
2004
Corpus ID: 17563062
The vast growth of wireless networks, with the associated importance of mobile computing, has generated a huge interest in…
Expand
2003
2003
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains
Jiejun Kong
,
Shirshanka Das
,
Edward Tsai
,
M. Gerla
WISE
2003
Corpus ID: 14475956
In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE