FADEWICH: Fast deauthentication over the wireless channel
Both authentication and deauthentication are instrumental for preventing unauthorized access to computers and other resources. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is...
Main Authors: | , , , |
---|---|
Format: | Conference item |
Published: |
Institute of Electrical and Electronics Engineers
2017
|
Subjects: |