Login / Signup
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.
Mathy Vanhoef
Frank Piessens
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
data mining
relational databases
neural network
real world
multimedia
cooperative
information technology
pairwise
ad hoc networks