Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Wired Equivalent Privacy

Known as: WEP Key, WEP, WEP-40 
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2009
2009
There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are… Expand
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and… Expand
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks… Expand
  • figure 1
  • figure 2
Is this relevant?
2002
2002
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a standard for wireless local area networks (WLANs). To… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Water-extractable P (WEP) in manure is correlated with P concentration in runoff from soils amended with manure and is, thus, an… Expand
  • figure 2
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control… Expand
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance… Expand
  • figure 8
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The paper analyzes the macroeconomic effects of limiting China's CO2 emissions by using a time-recursive dynamic computable… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?