1. On the reliability of wireless fingerprinting using clock skews;Arackaparambil,2010
2. Man-in-the-middle in tunnelled authentication protocols;Asokan,2003
3. Mitigating evil twin attacks in 802.11;Bauer,2008
4. A practical investigation of identity theft vulnerabilities in eduroam;Brenza,2015
5. Wireless device identification with radiometric signatures;Brik,2008