Cited By
View all- Agrawal AMaiti R(2024)iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP Mode or EZ Mode?IEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347108019(10058-10070)Online publication date: 2024
- Kumar APaul P(2018)A Secure Three-Way Handshake Authentication Process in IEEE 802.11iProceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017)10.1007/978-981-10-8234-4_58(725-737)Online publication date: 31-Jul-2018
- Zhu XXu FNovak ETan CLi QChen G(2017)Using Wireless Link Dynamics to Extract a Secret Key in Vehicular ScenariosIEEE Transactions on Mobile Computing10.1109/TMC.2016.255778416:7(2065-2078)Online publication date: 1-Jul-2017
- Show More Cited By