FADEWICH: Fast deauthentication over the wireless channel

Both authentication and deauthentication are instrumental for preventing unauthorized access to computers and other resources. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is...

Full description

Bibliographic Details
Main Authors: Conti, M, Lovisotto, G, Martinovic, I, Tsudik, G
Format: Conference item
Published: Institute of Electrical and Electronics Engineers 2017
Subjects: