Wired Equivalent Privacy (Simple English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Wired Equivalent Privacy" in Simple English language version.

refsWebsite
Global rank Simple English rank
1st place
1st place
580th place
549th place
low place
low place
low place
low place
1,306th place
1,285th place

berkeley.edu (Global: 580th place; Simple English: 549th place)

isaac.cs.berkeley.edu

  • Borisov, Nikita; Goldberg, Ian; Wagner, David (2001-07-16). "Intercepting Mobile Communications: The Insecurity of 802.11" (PDF). Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001). Archived from the original (PDF) on 2006-11-12. Retrieved 2006-09-12.

lirent.net (Global: low place; Simple English: low place)

rsa.com (Global: low place; Simple English: low place)

ucl.ac.uk (Global: 1,306th place; Simple English: 1,285th place)

cs.ucl.ac.uk

  • Bittau, Andrea; Handley, Mark; Lackey, Joshua (2006). "The Final Nail in WEP's Coffin" (PDF). Proceedings of the IEEE Symposium on Security and Privacy (S&P 2006). Retrieved 2008-03-16.

web.archive.org (Global: 1st place; Simple English: 1st place)

  • Borisov, Nikita; Goldberg, Ian; Wagner, David (2001-07-16). "Intercepting Mobile Communications: The Insecurity of 802.11" (PDF). Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001). Archived from the original (PDF) on 2006-11-12. Retrieved 2006-09-12.
  • "What is a WEP key?". lirent.net. Archived from the original on 2011-08-20. Retrieved 2008-03-11.
  • "Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era". rsa.com. Archived from the original on 2008-02-02. Retrieved 2008-03-11.