ARCHIVES
Research Article
Relative Investigation: Wi-Fi Security Conventions
Jyothis Unikkat1
Namboodiripad Jishnu2
12 Dept. of Computer Science Engineering, TOC H Institute of Science & Technology, Kerala, India.
Published Online: January-April 2023
Pages: 14-16
Cite this article
No DOIReferences
[1] MuhammadJuwaini,RaedAlsaquor,MahaAbdelhaq,Ola Alsukour,“AReviewonWEP Wireless Security Protocol”, Journal of
TheoreticalandAppliedInformationTechnology,40(1),2012.
[2] SiemensEnterpriseCommunicationsWhitepaper,“WLANSecurityToday:WirelessmoreSecurethan Wired”,2008.
[3] VandanaWekhande, “Wi-Fi Technology: SecurityIssues”,RivierAcademicJournal,2(2),2006.
[4] Paul Arana, “Benefits and Vulnerabilities of Wi-FiProtectedAccess2(WPA2)”,INFS612,2006.
[5] Shadi R. Masadeh and NidalTurab, “A Formal Evaluationof theSecurity SchemesforWirelessNetworks”, Research Journal of Applied
Sciences,EngineeringandTechnology,3(9),2011.
[6] Min-kyu Choi1, Rosslin John Robles, Chang-hwaHong, Tai-hoon Kim, “Wireless Network
Security:Vulnerabilities,ThreatsandCountermeasures”,InternationalJournalofMultimediaandUbiquitousEngineering,3(3),2008.
[7] FrankH.KatzArmstrong,AtlanticStateUniversity,“WPAvs.WPA2:IsWPA2ReallyanImprovement onWPA”.
[8] NidalTurab, FloricaMoldoveanu, “A ComparisonBetween Wireless LAN Security Protocols”, U.P.B.ScientificBulletin,71(1),2009.
TheoreticalandAppliedInformationTechnology,40(1),2012.
[2] SiemensEnterpriseCommunicationsWhitepaper,“WLANSecurityToday:WirelessmoreSecurethan Wired”,2008.
[3] VandanaWekhande, “Wi-Fi Technology: SecurityIssues”,RivierAcademicJournal,2(2),2006.
[4] Paul Arana, “Benefits and Vulnerabilities of Wi-FiProtectedAccess2(WPA2)”,INFS612,2006.
[5] Shadi R. Masadeh and NidalTurab, “A Formal Evaluationof theSecurity SchemesforWirelessNetworks”, Research Journal of Applied
Sciences,EngineeringandTechnology,3(9),2011.
[6] Min-kyu Choi1, Rosslin John Robles, Chang-hwaHong, Tai-hoon Kim, “Wireless Network
Security:Vulnerabilities,ThreatsandCountermeasures”,InternationalJournalofMultimediaandUbiquitousEngineering,3(3),2008.
[7] FrankH.KatzArmstrong,AtlanticStateUniversity,“WPAvs.WPA2:IsWPA2ReallyanImprovement onWPA”.
[8] NidalTurab, FloricaMoldoveanu, “A ComparisonBetween Wireless LAN Security Protocols”, U.P.B.ScientificBulletin,71(1),2009.
Related Articles
2023
Model Aphid Predator Neuroptera (Insecta): Web-Based Digital Key Development from Dichotomous Key by Computer Programming
2023
Distributed computing and Large Information Investigation
2023
Near Investigation of Characterization Calculations for Web Spam Recognition
2023
Heart Disease Prediction with Novel Machine Learning Technique
2023
Implementing KLM Algorithm and Open CV for Real Time Hand movement Tracking
2023