{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T06:51:13Z","timestamp":1774248673988,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540775348","type":"print"},{"value":"9783540775355","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_14","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"188-202","source":"Crossref","is-referenced-by-count":97,"title":["Breaking 104 Bit WEP in Less Than 60 Seconds"],"prefix":"10.1007","author":[{"given":"Erik","family":"Tews","sequence":"first","affiliation":[]},{"given":"Ralf-Philipp","family":"Weinmann","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Pyshkin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"386","volume-title":"IEEE Symposium on Security and Privacy","author":"A. Bittau","year":"2006","unstructured":"Bittau, A., Handley, M., Lackey, J.: The final nail in WEP\u2019s coffin. In: IEEE Symposium on Security and Privacy, pp. 386\u2013400. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"14_CR2","first-page":"180","volume-title":"ACM MobiCom 2001","author":"N. Borisov","year":"2001","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: ACM MobiCom 2001, pp. 180\u2013189. ACM Press, New York (2001)"},{"key":"14_CR3","unstructured":"Chaabouni, R.: Break WEP faster with statistical analysis. Technical report, EPFL, LASEC (June 2006), \n                    \n                      http:\/\/lasecwww.epfl.ch\/pub\/lasec\/doc\/cha06.pdf"},{"key":"14_CR4","unstructured":"D\u00f6rh\u00f6fer, S.: Empirische Untersuchungen zur WLAN-Sicherheit mittels Wardriving. Diplomarbeit, RWTH Aachen (September 2006) (in German)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"14_CR6","unstructured":"Hulton, D. (h1kari).: bsd-airtools, \n                    \n                      http:\/\/www.dachb0den.com\/projects\/bsd-airtools.html"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Klein, A.: Attacks on the RC4 stream cipher. Designs, Codes and Cryptography (submitted, 2007)","DOI":"10.1007\/s10623-008-9206-6"},{"key":"14_CR8","unstructured":"KoreK. chopchop (experimental WEP attacks) (2004), \n                    \n                      http:\/\/www.netstumbler.org\/showthread.php?t=12489"},{"key":"14_CR9","unstructured":"KoreK. Next generation of WEP attacks (2004), \n                    \n                      http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35"},{"key":"14_CR10","unstructured":"Maitra, S., Paul, G.: Many keystream bytes of RC4 leak secret key information. Cryptology ePrint Archive, Report2007\/261(2007), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"14_CR11","unstructured":"Ohigashi, T., Kuwakado, H., Morii, M.: A key recovery attack on WEP with less packets (2007)"},{"key":"14_CR12","unstructured":"Ozasa, Y., Fujikawa, Y., Ohigashi, T., Kuwakado, H., Morii, M.: A study on the Tews, Weinmann, Pyshkin attack against WEP. In: IEICE Tech. Rep., Hokkaido, July 2007. ISEC2007-47, vol.\u00a0107, pp. 17\u201321 (2007) Thu, Jul 19, 2007 - Fri, Jul 20 : Future University-Hakodate (ISEC, SITE, IPSJ-CSEC)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Plummer, D.C.: RFC 826: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware (November 1982)","DOI":"10.17487\/rfc0826"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Postel, J.: Internet Protocol. Request for Comments (Standard) 791, Internet Engineering Task Force (September 1981)","DOI":"10.17487\/rfc0791"},{"issue":"2","key":"14_CR15","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/996943.996948","volume":"7","author":"A. Stubblefield","year":"2004","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Transactions on Information and System Security\u00a07(2), 319\u2013332 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR16","unstructured":"The Aircrack-NG team. Aircrack-ng suite (2007), \n                    \n                      http:\/\/www.aircrack-ng.org"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive-only key recovery attacks on RC4. In: Selected Areas in Cryptography 2007. LNCS, Springer, Heidelberg (to appear, 2007)"},{"key":"14_CR18","unstructured":"Wi-Fi Alliance. Wi-Fi Protected Acccess (WPA) (2003), \n                    \n                      http:\/\/www.wi-fi.org"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:12:39Z","timestamp":1558264359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}