Login / Signup
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations.
Man Hong Hue
Joyanta Debnath
Kin Man Leung
Li Li
Mohsen Minaei
M. Hammad Mazhar
Kailiang Xian
Md. Endadul Hoque
Omar Chowdhury
Sze Yiu Chau
Published in:
CCS (2021)
Keyphrases
</>
information systems
knowledge management
business applications
secret key
access control
information management
trust negotiation
knowledge workers
enterprise information systems
social networks
e government
private data
authentication scheme