Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FPS (14. : 2021 : Paris) Foundations and practice of security
1. Verfasser: Lounis, Karim (VerfasserIn)
Weitere Verfasser: Ding, Steven H. H. (VerfasserIn), Zulkernine, Mohammad (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits 2022 Mandal, Kalikinkar
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems 2022 Avila, Ricardo
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection 2022 Vitorino, João
A Quantile-Based Watermarking Approach for Distortion Minimization 2022 Gort, Maikel Läzaro Perez
A Modular Runtime Enforcement Model Using Multi-traces 2022 Hallé,, Rania Taleb, Sylvain
K-Smali: An Executable Semantics for Program Verification of Reversed Android Applications 2022 Ziadia., Marwa
Generic Construction for Identity-Based Proxy Blind Signature 2022 Bultel, Xavier
Optimizing Anonymity and Performance in a Mix Network 2022 Jee, Mathieu
Breaking Black Box Crypto-Devices Using Laser Fault Injection 2022 Selmke, Bodo
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission 2022 Yi, Yunjie
Creation and Detection of German Voice Deepfakes 2022 Barnekow, Vanessa
Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex Organizations 2022 Mascia, Carla
An Extensive Comparison of Systems for Entity Extraction from Log Files 2022 Chhabra, Anubhav
Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era 2022 Bendoukha, Adda-Akram
HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM 2022 Paulin, Dylan
Automatic Annotation of Confidential Data in Java Code 2022 Bastys, Julia
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain 2022 Ankergård, Sigurd Frej Joel Jørgensen
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator 2022 Heine, Felix
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market? 2022 Seng, S.
At the Bottom of Binary Analysis: Instructions 2022 Bonfante, Guillaume
Alle Artikel auflisten