Wired Equivalent Privacy

Known as: WEP-104, WEP-40, WEP2 
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2016
0102019882016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Wireless Local Area Network (WLAN) is a flexible data communication system implemented as an extension to or as an alternative… (More)
  • figure 3.8
  • figure 4
  • figure 6
  • figure 3.1
  • table 4.2
Is this relevant?
2009
2009
There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2008
Review
2008
Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are… (More)
Is this relevant?
2005
2005
This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks… (More)
  • figure 1
  • figure 2
Is this relevant?
2004
2004
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet in the near future… (More)
  • figure I
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2003
2003
The Wired Equivalent Privacy (WEP) is defined as part of the IEEE 802.11 standard to provide secure communication over a wireless… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?