Association attacks: Identifying association protocols | IEEE Conference Publication | IEEE Xplore