Login / Signup
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions.
Sen Xu
Chin-Tser Huang
Published in:
ISWCS (2006)
Keyphrases
</>
security protocols
cryptographic protocols
medium access control
countermeasures
watermarking scheme
security flaws
malicious attacks
security properties
security mechanisms
intelligent agent technology
wireless lan
watermarking algorithm
communication protocol
ddos attacks
communication protocols
traffic analysis
terrorist attacks
anomaly detection