Minimizing re-authentication overheads in infrastructure IEEE 802.11 WLAN networks [re-authentication read pre-authentication].
Anindo MukherjeeTarun JoshiDharma P. AgrawalPublished in: WCNC (2005)
Keyphrases
- wireless local area network
- access points
- biometric authentication
- wireless networks
- factor authentication
- image authentication
- fragile watermarking
- security analysis
- user authentication
- identity management
- security requirements
- social networks
- integrity verification
- authentication scheme
- identity authentication
- peer to peer
- response time