Scientific Library of Tomsk State University

   E-catalog        

Normal view MARC view

Studying IEEE-802.11 encryption protocol M. Oduro, A. Poguda

By: Oduro, MichaelContributor(s): Poguda, A. AMaterial type: ArticleArticleContent type: Текст Media type: электронный Subject(s): беспроводные сети | протоколы шифрованияGenre/Form: статьи в сборниках Online resources: Click here to access online In: Инноватика - 2020 : сборник материалов XVI Международной школы-конференции студентов, аспирантов и молодых ученых, 23-25 апреля 2020 г., г. Томск, Россия С. 555-558Abstract: From the inception of wireless network in 1997, wireless network has enabled us to communicate over the internet without wired network. It has also grown exponentially over the past three decades and it is ubiquitous of all humans’ activities. As the wireless communication expands, so does wireless network threats. The IEEE in conjugation with Wi-Fi Alliance provides wireless encryption protocols: WEP, WPA, and WPA2.The article will look into the various weaknesses, strengths and attacks of each encryption protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Библиогр.: 12 назв.

From the inception of wireless network in 1997, wireless network has enabled us to communicate over the internet without wired network. It has also grown exponentially over the past three decades and it is ubiquitous of all humans’ activities. As the wireless communication expands, so does wireless network threats. The IEEE in conjugation with Wi-Fi Alliance provides wireless encryption protocols: WEP, WPA, and WPA2.The article will look into the various weaknesses, strengths and attacks of each encryption protocols.

There are no comments on this title.

to post a comment.
Share