Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
21
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
385
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
other
Author(s):
Chris McMahon Stone
,
Tom Chothia
,
Joeri de Ruiter
Publication date
(Online):
August 08 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Multimodal Learning Material
Most cited references
21
Record
: found
Abstract
: not found
Article
: not found
Testing Software Design Modeled by Finite-State Machines
T.S. Chow
(1978)
0
comments
Cited
89
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Weaknesses in the Key Scheduling Algorithm of RC4
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
(2001)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Model-Based Testing of Reactive Systems
Manfred Broy
,
Bengt. Jonsson
,
Joost-Pieter Katoen
…
(2005)
0
comments
Cited
17
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 08 2018
Pages
: 325-345
DOI:
10.1007/978-3-319-99073-6_16
SO-VID:
d2ab36f4-9eae-48a7-b164-b598464b2220
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM
pp. 26
On Leveraging Coding Habits for Effective Binary Authorship Attribution
pp. 48
Synthesis of a Permissive Security Monitor
pp. 66
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
pp. 87
Strain: A Secure Auction for Blockchains
pp. 111
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
pp. 132
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews
pp. 152
Efficient Proof Composition for Verifiable Computation
pp. 175
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
pp. 197
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
pp. 218
How Secure Is Green IT? The Case of Software-Based Energy Side Channels
pp. 243
Phishing Attacks Modifications and Evolutions
pp. 263
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
pp. 305
Beneath the Bonnet: A Breakdown of Diagnostic Security
pp. 325
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
pp. 346
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets
pp. 363
PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security Applications
pp. 385
POR for Security Protocol Equivalences
pp. 406
Automated Identification of Desynchronisation Attacks on Shared Secrets
pp. 427
Stateful Protocol Composition
pp. 470
Anonymous Single-Sign-On for n Designated Services with Traceability
pp. 491
Efficiently Deciding Equivalence for Standard Primitives and Phases
pp. 512
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
pp. 533
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
pp. 555
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics
pp. 575
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
pp. 595
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
Similar content
385
IEEE 802.11-saturation throughput analysis
Authors:
G. Bianchi
Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks
Authors:
Russell Holloway
,
Raheem Beyah
Revisiting 802.11 for User Fairness and Efficient Channel Utilization in Presence of LTE-U
Authors:
Anand Baswade
,
Touheed Anwar Atif
,
Bheemarjuna Tamma
…
See all similar
Cited by
1
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties
Authors:
Rajiv Singh
,
José Moreira
,
Tom Chothia
…
See all cited by