Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments.
Mohamed A. Abo-SolimanMarianne A. AzerPublished in: ICUFN (2018)
Keyphrases
- security management
- computer security
- security threats
- security problems
- malicious attacks
- security measures
- cyber attacks
- chosen plaintext
- security breaches
- fault injection
- security vulnerabilities
- security protocols
- network security
- information management
- knowledge management
- cryptographic protocols
- security mechanisms
- denial of service attacks
- security issues
- watermarking scheme
- stream cipher
- malicious users
- mobile devices