Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,996,190 papers from all fields of science
Search
Sign In
Create Free Account
Wired Equivalent Privacy
Known as:
WEP Key
, WEP
, WEP-40
Expand
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AirSnort
Algorithm
Cain and Abel
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Radar-based detection of birds near wind energy plants: First experiences from a field study
J. Moll
,
Moritz Malzer
,
+6 authors
M. Scholz
German Microwave Conference
2016
Corpus ID: 27378876
Bats and birds are at risk when they are flying near wind energy plants (WEP). Hence, a protection of bats and birds is…
Expand
2013
2013
Break WEP Faster with Statistical Analysis
Rafik Chaabouni
IACR Cryptology ePrint Archive
2013
Corpus ID: 6796442
The Wired Equivalent Protocol is nowadays considered as unsafe. However the only academic research that tries to break WEP has…
Expand
2012
2012
Analyzing the Impact of Security Protocols on Wireless LAN with Multimedia Applications
T. Hayajneh
,
Samer F. Khasawneh
,
Bassam Jamil
,
A. Itradat
International Conference on Emerging Security…
2012
Corpus ID: 54966416
The availability and reasonable cost of broadband Internet made it an attractive and favorable option to billions of users…
Expand
2010
2010
Late Pliocene equatorial Pacific
M. Medina‐Elizalde
,
D. Lea
2010
Corpus ID: 16111681
[1] Late Pliocene foraminiferal Mg/Ca and δ18O records from Ocean Drilling Program Hole 806B in the western equatorial Pacific…
Expand
2010
2010
Wired equivalent privacy reinvestigated
A. Mohapatra
,
N. Prakash
2010
Corpus ID: 56340902
Abstract Security is a strong requirement for effective deployment of business wireless communication applications. Therefore…
Expand
2007
2007
Word Error Probability Estimation by Means of a Modified Viterbi Decoder
J. Fricke
,
P. Hoeher
IEEE Vehicular Technology Conference
2007
Corpus ID: 11462759
In this paper, we introduce a new method for calculating word error probabilities by means of a modified Viterbi decoder. The…
Expand
2005
2005
Measuring performance impact of security protocols in wireless local area networks
A. K. Agarwal
,
Wenye Wang
2nd International Conference on Broadband…
2005
Corpus ID: 376162
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and…
Expand
2005
2005
IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability
Shivaputrappa Vibhuti
2005
Corpus ID: 63857628
The wireless networking is becoming very popular among large number of internet users. Because of the popularity of the wireless…
Expand
2004
2004
The effectiveness of brute force attacks on RC4
N. Couture
,
K. B. Kent
Proceedings. Second Annual Conference on…
2004
Corpus ID: 14486230
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use…
Expand
2002
2002
Wired Equivalent Privacy Vulnerability
P. C. Mehta
2002
Corpus ID: 1328609
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a standard for wireless local area networks (WLANs). To…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE