Login / Signup
Practical verification of WPA-TKIP vulnerabilities.
Mathy Vanhoef
Frank Piessens
Published in:
AsiaCCS (2013)
Keyphrases
</>
real world
model checking
machine learning
case study
data sets
face recognition
data structure
information security
practical application
practical problems
formal methods
formal analysis