Login / Signup
A systematic methodology for continuous WLAN abundance and security analysis.
Saku Lindroos
Antti Hakkala
Seppo Virtanen
Published in:
Comput. Networks (2021)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
encryption scheme
image encryption
authentication protocol
security model
wireless networks
security properties
encryption algorithm
quality of service
databases
multiresolution
proxy signature scheme
security mechanisms
mobile devices