|
Volumn , Issue , 2008, Pages 513-516
|
Mitigating evil twin attacks in 802.11
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESS POINT SELECTIONS;
ACCESS POINTS;
AUTHENTICATION METHODS;
CONTEXTUAL INFORMATIONS;
EXTENSIBLE AUTHENTICATION PROTOCOLS;
OPEN ACCESS;
TWO LINES;
WIRELESS CLIENTS;
AUTHENTICATION;
FREQUENCY ALLOCATION;
|
EID: 62849089985
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/PCCC.2008.4745081 Document Type: Conference Paper |
Times cited : (37)
|
References (7)
|