Login / Signup
Using Power Hopping to Counter MAC Spoof Attacks in WLAN.
Vijayakrishnan Nagarajan
Vetri Arasan
Dijiang Huang
Published in:
CCNC (2010)
Keyphrases
</>
spread spectrum
countermeasures
image watermarking
wireless networks
duty cycle
power consumption
biometric systems
watermarking algorithm
watermarking scheme
security protocols
access points
wireless lan
wireless local area network