(In)Secure Configuration Practices of WPA2 Enterprise Supplicants.
Alberto BartoliEric MedvetAndrea De LorenzoFabiano TarlaoPublished in: CoRR (2018)
Keyphrases
- security management
- small and medium sized enterprises
- knowledge workers
- case study
- information systems
- cryptographic protocols
- information management
- current practices
- knowledge management
- security measures
- security issues
- identity management
- authentication scheme
- enterprise architecture
- security level
- management practices
- security analysis
- database
- security requirements
- business applications
- business intelligence
- web applications
- data mining
- databases