A Comparative Study between WEP, WPA and WPA2 Security Algorithms
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)Publication Date: 2015-05-05
Authors : Tagwa Ahmed Bakri Gali; Amin Babiker A Nabi Mustafa;
Page : 2390-2391
Keywords : Wireless LAN; security technique; Wired Equivalent Privacy; Wi-Fi Protected Access; Wi-Fi Protected Access 2;
Abstract
This paper is a review study of the different security techniques that used to protect wireless networks from hackers. The main goal of this is to understand the concept of security techniques in the network and knowledge of the strengths and weakness points of these techniques in this field.
Other Latest Articles
- Effectiveness of Mulligan Mobilization versus Neural Mobilization in Patients with Cervical Radiculopathy: A Comparative Study
- Teacher's Distribution Pattern as Determinants of Effective Teaching and Learning in Nigeria Secondary Schools
- Performance Evaluation for UMTS and WiMAX in Handover
- Select Population Variables In Relation To Examination Writing Style Among +2 Mathematics Students
- An Ontology-Based Text Mining Method to Develop D-Matrix
Last modified: 2021-06-30 21:46:31