A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. Cassola, A., Robertson, W., Kirda, E., & Noubir, G.
abstract   bibtex   
Wireless networking technologies have fundamentally changed the way we compute, allowing ubiquitous, anytime, any-where access to information. At the same time, wireless technologies come with the security cost that adversaries may receive signals and engage in unauthorized communication even when not physically close to a network. Because of the utmost importance of wireless security, many standards have been developed that are in wide use to secure sensitive wireless networks; one such popular standard is WPA Enterprise.
@article{cassola_practical_nodate,
	title = {A {Practical}, {Targeted}, and {Stealthy} {Attack} {Against} {WPA} {Enterprise} {Authentication}},
	abstract = {Wireless networking technologies have fundamentally changed the way we compute, allowing ubiquitous, anytime, any-where access to information. At the same time, wireless technologies come with the security cost that adversaries may receive signals and engage in unauthorized communication even when not physically close to a network. Because of the utmost importance of wireless security, many standards have been developed that are in wide use to secure sensitive wireless networks; one such popular standard is WPA Enterprise.},
	language = {en},
	author = {Cassola, Aldo and Robertson, William and Kirda, Engin and Noubir, Guevara},
	pages = {15}
}

Downloads: 0