Login / Signup
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Ke Xu
Published in:
SP (2023)
Keyphrases
</>
countermeasures
watermarking scheme
security protocols
traffic analysis
data sets
malicious users
terrorist attacks
security mechanisms
malicious attacks
security risks
chosen plaintext
cryptographic protocols
image watermarking
computer security
watermarking algorithm
information systems
search engine