A machine learning-based scheme for the security analysis of authentication and key agreement protocols

Z Ma, Y Liu, Z Wang, H Ge, M Zhao - Neural Computing and Applications, 2020 - Springer
This paper proposes a novel machine learning-based scheme for the automatic analysis of
authentication and key agreement protocols. Considering the traditional formal protocol …

Analysing and attacking the 4-way handshake of IEEE 802.11 i standard

A Alabdulatif, X Ma, L Nolle - 8th International Conference for …, 2013 - ieeexplore.ieee.org
The IEEE 802.11 i standard has been designed to enhance security in wireless networks. In
the 4-way handshake the supplicant and the authenticator use the pairwise master key …