Login / Signup
Using end-to-middle security to protect against evil twin access points.
Eric Y. Chen
Mitsutaka Ito
Published in:
WOWMOM (2009)
Keyphrases
</>
access points
wireless local area network
data encryption
wireless networks
access control
information security
mobile devices
security policies
wireless networking
intrusion detection
mobile users
statistical databases
data protection