Search
Now showing items 1-1 of 1
Algorithm for Selection of EAP Authentic
(2016-06)
ABSTRACT
Several recent studies indicate that many implementations of authentication and access control in public WLANs are
compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to ...