|
Volumn , Issue , 2007, Pages 2255-2258
|
Modeling of man-in-the-middle attack in the wireless networks
|
Author keywords
GSM; MitM; Tunneled model; Wireless networks
|
Indexed keywords
MATHEMATICAL MODELS;
MOBILE DEVICES;
NETWORK SECURITY;
USER INTERFACES;
DEFENSE MODELS;
LOGICAL OPERATIONS;
TUNNELED MODELS;
WIRELESS NETWORK SECURITY;
WIRELESS NETWORKS;
|
EID: 38049001489
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/WICOM.2007.562 Document Type: Conference Paper |
Times cited : (26)
|
References (7)
|