Login / Signup
TrustedAP: Using the Ethereum Blockchain to Mitigate the Evil Twin Attack.
Phil Fox
Published in:
SIGCSE (2021)
Keyphrases
</>
databases
secret key
countermeasures
denial of service attacks
malicious attacks
data sets
detection mechanism
database
cooperative
encryption algorithm
block cipher
power analysis
malicious users