{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:55:57Z","timestamp":1774716957502,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,16]],"date-time":"2009-03-16T00:00:00Z","timestamp":1237161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,16]]},"DOI":"10.1145\/1514274.1514286","type":"proceedings-article","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T15:36:08Z","timestamp":1237304168000},"page":"79-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":118,"title":["Practical attacks against WEP and WPA"],"prefix":"10.1145","author":[{"given":"Erik","family":"Tews","sequence":"first","affiliation":[{"name":"TU-Darmstadt, Darmstadt, Germany"}]},{"given":"Martin","family":"Beck","sequence":"additional","affiliation":[{"name":"TU-Dresden, Dresden, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.40"},{"key":"e_1_3_2_1_2_1","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Communications Magazine","author":"Standards Board IEEE-SA","year":"2007","unstructured":"IEEE-SA Standards Board . Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Communications Magazine , IEEE , 2007 . IEEE-SA Standards Board. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Communications Magazine, IEEE, 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"LASEC","author":"Chaabouni Rafik","year":"2006","unstructured":"Rafik Chaabouni . Break WEP faster with statistical analysis. Technical report, EPFL , LASEC , June 2006 . Rafik Chaabouni. Break WEP faster with statistical analysis. Technical report, EPFL, LASEC, June 2006."},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Selected Areas in Cryptography","author":"Fluhrer Scott R.","year":"2001","unstructured":"Scott R. Fluhrer , Itsik Mantin , and Adi Shamir . Weaknesses in the key scheduling algorithm of RC4 . In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography 2001 , volume 2259 of Lecture Notes in Computer Science , pages 1 -- 24 . Springer , 2001. Scott R. Fluhrer, Itsik Mantin, and Adi Shamir. Weaknesses in the key scheduling algorithm of RC4. In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography 2001, volume 2259 of Lecture Notes in Computer Science, pages 1--24. Springer, 2001."},{"key":"e_1_3_2_1_5_1","volume-title":"Practical exploitation of RC4 weakness in WEP environments","author":"Hulton David","year":"2002","unstructured":"David Hulton . Practical exploitation of RC4 weakness in WEP environments , 2002 . presented at HiverCon 2002. David Hulton. Practical exploitation of RC4 weakness in WEP environments, 2002. presented at HiverCon 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"Isaac and rc4. {http:\/\/burtleburtle.net\/bob\/rand\/isaac.html","author":"Jenkins Robert J.","year":"1996","unstructured":"Robert J. Jenkins . Isaac and rc4. {http:\/\/burtleburtle.net\/bob\/rand\/isaac.html , 1996 . Robert J. Jenkins. Isaac and rc4. {http:\/\/burtleburtle.net\/bob\/rand\/isaac.html, 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9206-6"},{"key":"e_1_3_2_1_8_1","unstructured":"KoreK. chopchop (experimental WEP attacks). http:\/\/www.netstumbler.org\/showthread.php?t=12489 2004.  KoreK. chopchop (experimental WEP attacks). http:\/\/www.netstumbler.org\/showthread.php?t=12489 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Next generation of WEP attacks? http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35","author":"K.","year":"2004","unstructured":"Kore K. Next generation of WEP attacks? http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35 , 2004 . KoreK. Next generation of WEP attacks? http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35, 2004."},{"key":"e_1_3_2_1_11_1","volume-title":"November","author":"Plummer D. C.","year":"1982","unstructured":"D. C. Plummer . RFC 826 : Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware , November 1982 . D. C. Plummer. RFC 826: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware, November 1982."},{"key":"e_1_3_2_1_12_1","volume-title":"Rc4 algorithm revealed. Usenet posting","author":"Sterndark David","year":"1994","unstructured":"David Sterndark . Rc4 algorithm revealed. Usenet posting , Message- ID : sternCvKL4B.Hyy@netcom.com, Sep 1994 . David Sterndark. Rc4 algorithm revealed. Usenet posting, Message-ID: sternCvKL4B.Hyy@netcom.com, Sep 1994."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996948"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Erik\n      Tews Ralf-Philipp\n      Weinmann and \n      Andrei\n      Pyshkin\n    .\n  Breaking 104 bit wep in less than 60 seconds\n  . In Sehun Kim Moti Yung and Hyung-Woo Lee editors WISA volume \n  4867\n   of \n  Lecture Notes in Computer Science pages \n  188\n  --\n  202\n  . \n  Springer 2007\n  .   Erik Tews Ralf-Philipp Weinmann and Andrei Pyshkin. Breaking 104 bit wep in less than 60 seconds. In Sehun Kim Moti Yung and Hyung-Woo Lee editors WISA volume 4867 of Lecture Notes in Computer Science pages 188--202. Springer 2007.","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography","author":"Vaudenay Serge","year":"2007","unstructured":"Serge Vaudenay and Martin Vuagnoux . Passive-only key recovery attacks on RC4 . In Selected Areas in Cryptography 2007 , Lecture Notes in Computer Science . Springer , 2007. Serge Vaudenay and Martin Vuagnoux. Passive-only key recovery attacks on RC4. In Selected Areas in Cryptography 2007, Lecture Notes in Computer Science. Springer, 2007."}],"event":{"name":"WISEC '09: Second ACM Conference on Wireless Network Security","location":"Zurich Switzerland","acronym":"WISEC '09","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the second ACM conference on Wireless network security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1514274.1514286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:19Z","timestamp":1750253419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,16]]},"references-count":14,"alternative-id":["10.1145\/1514274.1514286","10.1145\/1514274"],"URL":"https:\/\/doi.org\/10.1145\/1514274.1514286","relation":{},"subject":[],"published":{"date-parts":[[2009,3,16]]},"assertion":[{"value":"2009-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}