Login / Signup

Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles.

Pieter RobynsBram BonnéPeter QuaxWim Lamotte
Published in: WISEC (2014)
Keyphrases
  • information systems
  • change management
  • activity monitoring
  • data sets
  • real time
  • data mining
  • machine learning
  • information retrieval
  • database systems
  • search algorithm
  • future development
  • implementation details