Formal analysis of authentication in 802.11i
From MaRDI portal
Publication:615212
Recommendations
Cited in
(6)- Information Security and Cryptology
- A modular security analysis of EAP and IEEE 802.11
- Formal analysis of IEEE 802.11i
- scientific article; zbMATH DE number 2030095 (Why is no real title available?)
- Vulnerabilities analysis of RTS/CTS mechanism in 802.11 protocols
- Applied Cryptography and Network Security
This page was built for publication: Formal analysis of authentication in 802.11i
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q615212)