Publisher
Springer International Publishing
Reference9 articles.
1. Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1313–1328. ACM, New York (2017)
2. Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)
3. Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. IEEE (2009)
4. Chin, T., Xiong, K.: MPBSD: a moving target defense approach for base station security in wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Algorithms, Systems, and Applications. IEEE (2016)
5. Pisa, C., Caponi, A., Dargahi, T., Bianchi, G., Blefari-Melazzi, N.: WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures, pp. 31–36 (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献