Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,930,391 papers from all fields of science
Search
Sign In
Create Free Account
Wired Equivalent Privacy
Known as:
WEP Key
, WEP
, WEP-40
Expand
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AirSnort
Algorithm
Cain and Abel
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Clustering Protocols in Wireless Sensor Networks : A Survey 1 st
Poonam Sinha
2013
Corpus ID: 18238454
In recent years, the applications of Wireless Sensor Networks (WSNs) have grown enormously. In WSNs there is one mechanism used…
Expand
Review
2012
Review
2012
A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques
M. Wazid
,
R. Singh
,
+8 authors
Bhawna Kochar
2012
Corpus ID: 38829699
A Mobile Ad-Hoc Network (MANET) is a collection of mobile nodes (stations) communicating in a multi hop way without any fixed…
Expand
2012
2012
Analyzing the Impact of Security Protocols on Wireless LAN with Multimedia Applications
T. Hayajneh
,
Samer F. Khasawneh
,
Bassam Jamil
,
A. Itradat
International Conference on Emerging Security…
2012
Corpus ID: 54966416
The availability and reasonable cost of broadband Internet made it an attractive and favorable option to billions of users…
Expand
2010
2010
Late Pliocene equatorial Pacific
M. Medina‐Elizalde
,
D. Lea
2010
Corpus ID: 16111681
[1] Late Pliocene foraminiferal Mg/Ca and δ18O records from Ocean Drilling Program Hole 806B in the western equatorial Pacific…
Expand
2010
2010
Wired equivalent privacy reinvestigated
A. Mohapatra
,
N. Prakash
2010
Corpus ID: 56340902
Abstract Security is a strong requirement for effective deployment of business wireless communication applications. Therefore…
Expand
2007
2007
Word Error Probability Estimation by Means of a Modified Viterbi Decoder
J. Fricke
,
P. Hoeher
IEEE Vehicular Technology Conference
2007
Corpus ID: 11462759
In this paper, we introduce a new method for calculating word error probabilities by means of a modified Viterbi decoder. The…
Expand
Highly Cited
2005
Highly Cited
2005
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation
A. Wool
Wirel. Networks
2005
Corpus ID: 12215642
The IEEE 802.11 Wireless LAN standard has been designed with very limited key management capabilities, using up to 4 static, long…
Expand
2005
2005
Measuring performance impact of security protocols in wireless local area networks
A. K. Agarwal
,
Wenye Wang
2nd International Conference on Broadband…
2005
Corpus ID: 376162
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and…
Expand
2004
2004
The effectiveness of brute force attacks on RC4
N. Couture
,
K. B. Kent
Proceedings. Second Annual Conference on…
2004
Corpus ID: 14486230
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use…
Expand
2002
2002
Wired Equivalent Privacy Vulnerability
P. C. Mehta
2002
Corpus ID: 1328609
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a standard for wireless local area networks (WLANs). To…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE