Academic literature on the topic 'WPA2'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WPA2.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "WPA2"
Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.
Full textBartoli, Alberto. "Understanding Server Authentication in WPA3 Enterprise." Applied Sciences 10, no. 21 (November 6, 2020): 7879. http://dx.doi.org/10.3390/app10217879.
Full textSarmiento, Oscar P., Fabio G. Guerrero, and David Rey Argote. "Basic security measures for IEEE 802.11 wireless networks." Ingeniería e Investigación 28, no. 2 (May 1, 2008): 89–96. http://dx.doi.org/10.15446/ing.investig.v28n2.14898.
Full textDevit, Devit Satria. "Implementasi Sistem Keamanan Wi-Fi Menggunakan Sistem Operasi Kali Linux Di SMKN 5 Dumai." Journal Of Computer Science Contributions (JUCOSCO) 2, no. 1 (February 2, 2022): 57–70. http://dx.doi.org/10.31599/jucosco.v2i1.941.
Full textShadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textKalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.
Full textHidayat, Aziz Setyawan, Ulin Nuha, Yamin Nuryamin, and Suleman Suleman. "Quality Of Service Filtering Dengan Metode Filtering Mac Address Jaringan Wireless." Jurnal Teknologi Informatika dan Komputer 7, no. 1 (March 25, 2021): 52–59. http://dx.doi.org/10.37012/jtik.v7i1.502.
Full textPrasetyo, Stefanus Eko, and Try Windranata. "PERBANDINGAN SISTEM AUTENTIKASI WPA2 EAP-PSK PADA JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING MENGGUNAKAN FLUXION TOOLS." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 7, no. 1 (January 11, 2022): 43–51. http://dx.doi.org/10.36341/rabit.v7i1.2206.
Full textFaíscas, Diogo. "(In)Security in Wi-Fi networks: a systematic review." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 17–23. http://dx.doi.org/10.56394/aris2.v2i2.18.
Full textDissertations / Theses on the topic "WPA2"
Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.
Full textAkinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.
Full textVojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.
Full textKlepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.
Full textДегтяренко, А. В. "Аналіз методів захисту бездротових корпоративних мереж." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23021.
Full textМета аналізу: розробити об’єкт дослідження та створити бездротову мережу і покращити її технологію захисту. Та створити резервну систему електроживлення. Технології аналізу:WAP, IEEE 802.11, HTTP, WISP, WIFI. Результат роботи: Використання МАС фільтралізації. створення системи резервного електроживлення та покращення системи захисту. Робота може застосовуватися в комерційних та державних підприємствах та офісах для покращення бездротової системи та усунення хакерьских атак та для захисту інформації.
Eriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.
Full textSyftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:
- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?
- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?
- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?
Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.
Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.
Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.
Full textFalk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.
Full textThis thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.
The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.
Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.
The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.
This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.
Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.
Full textEndrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Full textBooks on the topic "WPA2"
Opdycke, Sandra. The WPA. New York, NY: Routledge, 2016. | Series: Critical moments in American: Routledge, 2016. http://dx.doi.org/10.4324/9781315743219.
Full textDeNoon, Christopher. Posters of the WPA. Los Angeles: Wheatley Press in association with University of Washington Press, 1987.
Find full textPosters of the WPA. Los Angeles: Wheatley Press, in association with the University of Washington Press, Seattle, 1987.
Find full textYŏn'guwŏn, Han'guk Chŏnja T'ongsin. WPAN mit home sensŏ net'ŭwŏk'ŭ p'yojun kaebal: A standard development of WPAN and home sensor network. [Seoul]: Chŏngbo T'ongsinbu, 2007.
Find full text1952-, Simon F. Kevin, ed. The WPA guide to Kentucky. Lexington: University Press of Kentucky, 1996.
Find full textProject, Tennessee Writers', ed. The WPA guide to Tennessee. Knoxville: University of Tennessee Press, 1986.
Find full textProject, Minnesota Federal Writers', ed. The WPA guide to Minnesota. St. Paul: Minnesota Historical Society, 1985.
Find full textFederal Writers' Project (Pa.) and Pennsylvania Historical and Museum Commission., eds. The WPA guide to Philadelphia. Philadelphia: University of Pennsylvania Press, 1988.
Find full textLindsay, Baker T., Baker Julie P. 1943-, and United States. Work Projects Administration., eds. The WPA Oklahoma slave narratives. Norman: University of Oklahoma Press, 1996.
Find full textBook chapters on the topic "WPA2"
Khasawneh, Mahmoud, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani. "A Survey on Wi-Fi Protocols: WPA and WPA2." In Communications in Computer and Information Science, 496–511. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_44.
Full textAtluri, Sidharth, and Revanth Rallabandi. "Deciphering WEP, WPA, and WPA2 Pre-shared Keys Using Fluxion." In Smart Computing Techniques and Applications, 377–85. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0878-0_37.
Full textLounis, Karim, Steven H. H. Ding, and Mohammad Zulkernine. "Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3." In Foundations and Practice of Security, 235–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08147-7_16.
Full textChen, Chin-Ling, and Supaporn Punya. "Enhanced WPA2/PSK for Preventing Authentication Cracking." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 156–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62205-3_15.
Full textChang, TienHo, Chiamei Chen, Hanwei Hsiao, and GuHsin Lai. "The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs." In Communications in Computer and Information Science, 118–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7850-7_11.
Full textDuc, Hung Bui, Stefan Pocarovsky, Milos Orgon, and Martin Koppl. "Penetration Testing of WiFi Networks Secured by WEP and WPA/WPA2 Protocols." In Informatics and Cybernetics in Intelligent Systems, 571–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_56.
Full textGe, Liang, Lianhai Wang, Lijuan Xu, and Shumian Yang. "Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU." In Wireless Communications, Networking and Applications, 1149–59. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2580-5_105.
Full textAjay, Aiswarya, P. P. Amritha, and M. Sethumadhavan. "Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack." In Lecture Notes in Electrical Engineering, 323–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9019-1_29.
Full textPacheco de Carvalho, J. A. R., H. Veiga, C. F. Ribeiro Pacheco, and A. D. Reis. "Extended Performance Research on 5 GHz IEEE 802.11n WPA2 Laboratory Links." In Transactions on Engineering Technologies, 313–23. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0746-1_24.
Full textSukhija, Swati, and Shilpi Gupta. "Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization." In Lecture Notes in Electrical Engineering, 391–97. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-3363-7_44.
Full textConference papers on the topic "WPA2"
Liu, Yonglei. "Defense of WPA/WPA2-PSK Brute Forcer." In 2015 2nd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2015. http://dx.doi.org/10.1109/icisce.2015.48.
Full textAbdelrahman, A., H. Khaled, Eman Shaaban, and Wail S. Elkilani. "WPA-WPA2 PSK Cracking Implementation on Parallel Platforms." In 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/icces.2018.8639328.
Full textAdnan, Abdillahi Hassan, Mohamed Abdirazak, A. B. M. Shamsuzzaman Sadi, Towfique Anam, Sazid Zaman Khan, Mohammed Mahmudur Rahman, and Mohamed Musse Omar. "A comparative study of WLAN security protocols: WPA, WPA2." In 2015 International Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2015. http://dx.doi.org/10.1109/icaee.2015.7506822.
Full textLiu, Yonglei, Zhigang Jin, and Ying Wang. "Survey on Security Scheme and Attacking Methods of WPA/WPA2." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601275.
Full textArash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234856.
Full textMoissinac, Kyle, David Ramos, Giovanna Rendon, and Abdelrahman Elleithy. "Wireless Encryption and WPA2 Weaknesses." In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9376023.
Full textHegde, Seema B., Aditya Ranjan, Aman Raj, Krishanu Paul, and Smritimay Santra. "WPA2 Based Wireless Enterprise Configuration." In 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2021. http://dx.doi.org/10.1109/icmnwc52512.2021.9688387.
Full textRadivilova, Tamara, and Hassan Ali Hassan. "Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise." In 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo). IEEE, 2017. http://dx.doi.org/10.1109/ukrmico.2017.8095429.
Full textNoh, Jaewon, Jeehyeong Kim, Giwon Kwon, and Sunghyun Cho. "Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography." In 2016 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2016. http://dx.doi.org/10.1109/icce-asia.2016.7804782.
Full textSouza, Eduardo Ferreira de, and Paulo André da S. Gonçalves. "Um Mecanismo de Autenticação Baseado em ECDH para Redes IEEE 802.11." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/sbseg.2010.20582.
Full textReports on the topic "WPA2"
Author, Not Given. Wind Powering America Podcasts, Wind Powering America (WPA). Office of Scientific and Technical Information (OSTI), April 2012. http://dx.doi.org/10.2172/1041355.
Full textGollenbeek, Luuk, Jos van Gastel, Paul Bussmann, Julien Voogt, Roland Melse, and Nico Verdoes. Verkenning mogelijke mestverwerkingsroutes en duurzaamheidsaspecten : Next Level Mestverwaarden WP2. Wageningen: Wageningen Livestock Research, 2020. http://dx.doi.org/10.18174/530720.
Full textKootstra, A. M. J. Direct processing of sugar beet using Betaprocess : Chembeet WP1 and WP2. Wageningen: ACRRES, Wageningen University & Research, 2017. http://dx.doi.org/10.18174/425474.
Full textBrouwer, Bastiaan, Mariska Nijenhuis-de Vries, Fátima I. Pereira da Silva, Najim El Harchioui, and Suzan Gabriëls. Postharvest quality of different papaya cultivars : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/503783.
Full textLantz, Eric, Ryan Wiser, and Maureen Hand. WP2 IEA Wind Task 26:The Past and Future Cost of Wind Energy. Office of Scientific and Technical Information (OSTI), May 2012. http://dx.doi.org/10.2172/1183175.
Full textBrouwer, Bastiaan, Suzan Gabriëls, and Matthijs Montsma. Assessing quality and reducing batchvariety in Golden Honeydew Melons : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/563036.
Full textBrouwer, Bastiaan, Suzan Gabriëls, and Matthijs Montsma. Assessing quality and reducing batch variety in Golden Honeydew Melons : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/503211.
Full textvan der Lee, Jan, Bockline Omedo Bebe, and Simon Oosting. Sustainable intensification pathways for dairy farming in Kenya : A case study for PROIntensAfrica WP2, Deliverable 2.3. Wageningen: Wageningen Livestock Research, 2016. http://dx.doi.org/10.18174/401333.
Full textGollenbeek, Luuk, Jos van Gastel, Flavia Casu, and Nico Verdoes. Emissies en kosten van verschillende scenario’s voor de verwaarding van kalvermest : NL Next level mestverwaarden WP2. Wageningen: Wageningen Livestock Research, 2021. http://dx.doi.org/10.18174/555424.
Full textAyers, R., G. P. Course, and G. R. Pasco. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package (2) final report WP2A: development and pilot deployment of a prototypic autonomous fisheries data harvesting system, and WP2B: investigation into the availability and adaptability of novel technological approaches to data collection. Edited by Mark James and Hannah Ladd-Jones. Marine Alliance for Science and Technology for Scotland (MASTS), 2019. http://dx.doi.org/10.15664/10023.23443.
Full text