Login / Signup
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles.
Pieter Robyns
Bram Bonné
Peter Quax
Wim Lamotte
Published in:
WISEC (2014)
Keyphrases
</>
information systems
change management
activity monitoring
data sets
real time
data mining
machine learning
information retrieval
database systems
search algorithm
future development
implementation details