Login / Signup
Security Analysis and Improvements for IEEE 802.11i.
Changhua He
John C. Mitchell
Published in:
NDSS (2005)
Keyphrases
</>
security analysis
security model
public key
security requirements
smart card
high security
security properties
encryption scheme
image encryption
authentication scheme
authentication protocol
mutual authentication
databases
private key
user authentication
software systems
low cost