Exposing WPA2 security protocol vulnerabilities.
Achilleas TsitroulisDimitris LampoudisEmmanuel TseklevesPublished in: Int. J. Inf. Comput. Secur. (2014)
Keyphrases
- security protocols
- security mechanisms
- security issues
- resource constrained
- automated design
- cryptographic algorithms
- security services
- information security
- smart card
- security requirements
- security problems
- operating system
- access control
- security properties
- authentication protocol
- security threats
- artificial immune algorithm
- key management
- countermeasures
- security policies
- response time
- database systems
- information systems
- rfid tags
- energy consumption
- data processing
- data mining