Login / Signup
Practical attacks against WEP and WPA.
Erik Tews
Martin Beck
Published in:
WISEC (2009)
Keyphrases
</>
security mechanisms
stream cipher
security issues
secret key
security threats
operating system
denial of service attacks
real world
low cost
access control
watermarking algorithm
security protocols