Skip to main content
placeholder image

Security Analysis of Michael: The IEEE 802.11i Message Integrity Code

Conference Paper


Download full-text (Open Access)

Abstract


Publication Date


  • 2005

Citation


  • Huang, J., Seberry, J. R., Susilo, W. & Bunder, M. W. (2005). Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y. Dai & L. Yang (Eds.), International Conference on Embedded and Ubiquitous Computing (pp. 423-432). Germany: Springer.

Scopus Eid


  • 2-s2.0-33744936311

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2618&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1598

Has Global Citation Frequency


Start Page


  • 423

End Page


  • 432

Place Of Publication


  • Germany

Abstract


Publication Date


  • 2005

Citation


  • Huang, J., Seberry, J. R., Susilo, W. & Bunder, M. W. (2005). Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. In T. Enokido, L. Yan, B. Xiao, D. Kim, Y. Dai & L. Yang (Eds.), International Conference on Embedded and Ubiquitous Computing (pp. 423-432). Germany: Springer.

Scopus Eid


  • 2-s2.0-33744936311

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2618&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1598

Has Global Citation Frequency


Start Page


  • 423

End Page


  • 432

Place Of Publication


  • Germany