Skip to search formSkip to main contentSkip to account menu

Wired Equivalent Privacy

Known as: WEP Key, WEP, WEP-40 
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Bats and birds are at risk when they are flying near wind energy plants (WEP). Hence, a protection of bats and birds is… 
2013
2013
The Wired Equivalent Protocol is nowadays considered as unsafe. However the only academic research that tries to break WEP has… 
2012
2012
The availability and reasonable cost of broadband Internet made it an attractive and favorable option to billions of users… 
2010
2010
[1] Late Pliocene foraminiferal Mg/Ca and δ18O records from Ocean Drilling Program Hole 806B in the western equatorial Pacific… 
2010
2010
Abstract Security is a strong requirement for effective deployment of business wireless communication applications. Therefore… 
2007
2007
In this paper, we introduce a new method for calculating word error probabilities by means of a modified Viterbi decoder. The… 
2005
2005
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and… 
2005
2005
The wireless networking is becoming very popular among large number of internet users. Because of the popularity of the wireless… 
2004
2004
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use… 
2002
2002
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a standard for wireless local area networks (WLANs). To…