Cited By
View all- Zhao XRoy ABanerjee ASrinivasan KKim YKim JKoushanfar FRasmussen K(2024)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656136(162-173)Online publication date: 27-May-2024
- Amma NJayaraj TAmma N(2024)Towards improving the security of wireless networks using secured session keysInformation Security Journal: A Global Perspective10.1080/19393555.2024.234768234:1(1-14)Online publication date: 6-May-2024
- Wang KZheng YZhang QBai GQin MZhang DDong J(2022)Assessing certificate validation user interfaces of WPA supplicantsProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3517026(501-513)Online publication date: 14-Oct-2022
- Show More Cited By