Login / Signup
Security Analysis and Improvements on WLANs.
Li Wang
Bala Srinivasan
Nandita Bhattacharjee
Published in:
J. Networks (2011)
Keyphrases
</>
security analysis
public key
smart card
security model
high security
security requirements
security properties
wireless networks
encryption scheme
image encryption
authentication protocol
user authentication
mutual authentication
real time
data mining
encryption algorithm
data model
database systems
databases