Login / Signup
Introducing IJam Wireless De-authentication Attack Tool.
Haitham Al-Ani
Ahmed Al-Zubidy
Published in:
ACM Southeast Regional Conference (2017)
Keyphrases
</>
authentication protocol
wireless networks
wireless local area network
authentication mechanism
wireless communication
authentication scheme
mobile devices
mobile users