Author:
Barbeau Michel,Hall Jyanthi,Kranakis Evangelos
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. Aboba, B.: The unofficial 802.11 security web page - security vulnerabilities in EAP methods (May 2005), http://www.drizzle.com/~aboba/IEEE/
2. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible authentication protocol (EAP). The Internet Engineering Task Force - Request for Comments, 3748 (June 2004)
3. Aboba, B., Simon, D.: PPP EAP TLS authentication protocol. The Internet Engineering Task Force - Request for Comments, 2716 (October 1999)
4. Adelstein, F., Alla, P., Joyce, R., Richard III, G.G.: Physically locating wireless intruders. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), pp. 482–489 (2004)
5. WiFi Alliance. Wi-fi protected access (WPA) enhanced security implementation based on ieee p802.11i standard, version 3.1 (August 2004)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献