Login / Signup
Hacking 802.11 Protocol Insecurities.
Aditya K. Sood
Published in:
login Usenix Mag. (2008)
Keyphrases
</>
lightweight
security analysis
network protocols
communication protocol
formal analysis
cryptographic protocols
intelligence and security informatics
database systems
multi agent
authentication protocol
application layer
tcp ip
communication protocols
penetration testing
coloured petri nets