1. A practical, targeted, and stealthy attack against WPA enterprise authentication;Cassola,2013
2. A practical investigation of identity theft vulnerabilities in eduroam;Brenza,2015
3. Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles;Robyns,2014
4. DROWN: breaking TLS using sslv2;Aviram,2016
5. Key reinstallation attacks: forcing nonce reuse in WPA2;Vanhoef,2017