Authentication in 802.11 LANs Using a Covert Side Channel.
Telvis E. CalhounReed NewmanRaheem A. BeyahPublished in: ICC (2009)
Keyphrases
- information flow
- smart card
- authentication scheme
- biometric authentication
- countermeasures
- identity authentication
- image authentication
- authentication protocol
- identity management
- user authentication
- network analysis
- secret key
- security analysis
- key distribution
- low cost
- security services
- integrity verification
- power analysis
- neural network
- terrorist networks
- security requirements
- social network analysis
- digital images