Cited By
View all- Hao Fvan Oorschot PSuga YSakurai KDing XSako K(2022)SoKProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3523256(697-711)Online publication date: 30-May-2022
- Lorente EMeijer CVerdult R(2015)Scrutinizing WPA2 password generating algorithms in wireless routersProceedings of the 9th USENIX Conference on Offensive Technologies10.5555/2831211.2831221(10-10)Online publication date: 10-Aug-2015
- Liu BWang J(2013)Research on the Network Security Protocols Based on the Strand Spaces TheoryApplied Mechanics and Materials10.4028/www.scientific.net/AMM.457-458.1134457-458(1134-1138)Online publication date: Oct-2013
- Show More Cited By