Login / Signup

Practical verification of WPA-TKIP vulnerabilities.

Mathy VanhoefFrank Piessens
Published in: AsiaCCS (2013)
Keyphrases
  • real world
  • model checking
  • machine learning
  • case study
  • data sets
  • face recognition
  • data structure
  • information security
  • practical application
  • practical problems
  • formal methods
  • formal analysis