Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper | Communication Science | Sudan | Volume 4 Issue 5, May 2015
A Comparative Study between WEP, WPA and WPA2 Security Algorithms
Tagwa Ahmed Bakri Gali [2] | Amin Babiker A/Nabi Mustafa [32]
Abstract: This paper is a review study of the different security techniques that used to protect wireless networks from hackers. The main goal of this is to understand the concept of security techniques in the network and knowledge of the strengths and weakness points of these techniques in this field.
Keywords: Wireless LAN, security technique, Wired Equivalent Privacy, Wi-Fi Protected Access, Wi-Fi Protected Access 2
Edition: Volume 4 Issue 5, May 2015,
Pages: 2390 - 2391
Similar Articles with Keyword 'LAN'
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Communication Science, Ivory Coast, Volume 13 Issue 1, January 2024
Pages: 587 - 591Communication Strategies and Impacts of OIPR Tree Planting Initiative in the North-East of Ivory Coast for the Nature Conservation
Bassemory KONE | KOUAME Kumou Alphonse | OUATTARA Abdoumanhe
Downloads: 111
Research Paper, Communication Science, Indonesia, Volume 9 Issue 2, February 2020
Pages: 1761 - 1769Organizational Communication Climate Perspective on the Performance of the Regional Development Planning Agency of Banyuwangi Regency
Selfi Budi Helpiastuti | Giyanto [6]