Login / Signup

Towards a zero configuration authentication scheme for 802.11 based networks.

Carolin LatzeUlrich Ultes-NitscheFlorian Baumgartner
Published in: LCN (2008)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • public key
  • image encryption
  • secret key
  • authentication protocol
  • image authentication
  • security flaws
  • security analysis
  • distributed systems
  • computer networks