Login / Signup
Towards a zero configuration authentication scheme for 802.11 based networks.
Carolin Latze
Ulrich Ultes-Nitsche
Florian Baumgartner
Published in:
LCN (2008)
Keyphrases
</>
authentication scheme
smart card
user authentication
public key
image encryption
secret key
authentication protocol
image authentication
security flaws
security analysis
distributed systems
computer networks