Journal articles on the topic 'WPA/WPA2'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 journal articles for your research on the topic 'WPA/WPA2.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textJohnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.
Full textKalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.
Full textJiang, Zi Gui. "Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2)." Advanced Materials Research 1049-1050 (October 2014): 1993–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1993.
Full textJude Saskara, Gede Arna, I. Putu Oktap Indrawan, and Putu Maha Putra. "KEAMANAN JARINGAN KOMPUTER NIRKABEL DENGAN CAPTIVE PORTAL DAN WPA/WPA2 DI POLITEKNIK GANESHA GURU." Jurnal Pendidikan Teknologi dan Kejuruan 16, no. 2 (July 31, 2019): 236. http://dx.doi.org/10.23887/jptk-undiksha.v16i2.18559.
Full textBanakh, R. I. "AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT." Radio Electronics, Computer Science, Control, no. 1 (May 29, 2018): 110–18. http://dx.doi.org/10.15588/1607-3274-2018-1-13.
Full textSu, Di Xin, Zhi Xue, and Yong Shi. "Analysis of Wireless Network Security Based on 4-Way Handshake Protocol." Advanced Materials Research 1006-1007 (August 2014): 924–29. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.924.
Full textPETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.
Full textYong-lei, Liu, and Jin Zhi-gang. "Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture." International Journal of Communication Systems 28, no. 4 (November 25, 2013): 723–42. http://dx.doi.org/10.1002/dac.2699.
Full textShadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.
Full textFajri, Ahmad. "Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 671. http://dx.doi.org/10.25126/jtiik.2019661832.
Full textUgwoke, F. N., and K. C. Okafor. "Cloud-DLT: A Disruptive Cloud based Digital Library using Lean Design Technique." Circulation in Computer Science DC CPS 2017, no. 01 (June 5, 2017): 27–36. http://dx.doi.org/10.22632/ccs-2017-cps-04.
Full textPurwanto, Timur Dali, and Alek Wijaya. "EVALUASI APLIKASI EXPLOID WIFI DI TINGKAT AVAILABILITY DAN VULNERABILITY." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 8, no. 2 (November 1, 2017): 801. http://dx.doi.org/10.24176/simet.v8i2.1613.
Full textFarabi Phasa, Fianda, Joseph Dedy Irawan, and Suryo Adi Wibowo. "SISTEM AUTENTIFIKASI HOSTPOT MENGGUNAKAN LDAP SERVER." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 2 (October 14, 2020): 120–27. http://dx.doi.org/10.36040/jati.v4i2.2703.
Full textMuis Rajab, Arini, MT,. "Pengujian Celah Keamanan 5 Jenis Metode Wireless LAN Security." JURNAL TEKNIK INFORMATIKA 4, no. 1 (October 6, 2015). http://dx.doi.org/10.15408/jti.v4i1.2011.
Full textIndira Reddy, B., and V. Srikanth. "Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 10, 2019, 28–35. http://dx.doi.org/10.32628/cseit1953127.
Full textChang, Tien-Ho, Chia-Mei Chen, Han-Wei Hsiao, and Gu-Hsin Lai. "Cracking of WPA & WPA2 Using GPUs and Rule-based Method." Intelligent Automation and Soft Computing, 2018, —1——1. http://dx.doi.org/10.31209/2018.100000054.
Full text