Login / Signup

Introducing IJam Wireless De-authentication Attack Tool.

Haitham Al-AniAhmed Al-Zubidy
Published in: ACM Southeast Regional Conference (2017)
Keyphrases
  • authentication protocol
  • wireless networks
  • wireless local area network
  • authentication mechanism
  • wireless communication
  • authentication scheme
  • mobile devices
  • mobile users