Login / Signup
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Aldo Cassola
William K. Robertson
Engin Kirda
Guevara Noubir
Published in:
NDSS (2013)
Keyphrases
</>
authentication protocol
real world
authentication mechanism
knowledge management
information management
information systems
security analysis
business intelligence
wireless networks