2019
DOI: 10.1007/978-3-030-30143-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Public WiFi Security Network Protocol Practices in Tourist Destination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…Further, Lv et al (2) discuss potential information security vulnerabilities associated with the usage of Wi-Fi networks. Wireless technologies operate without the physical and logical boundaries of their wired equivalents, putting the network infrastructure and users at risk (3) . 5G networks confront a multitude of dangers.…”
Section: Fig 1 5g Network and Issuesmentioning
confidence: 99%
“…Further, Lv et al (2) discuss potential information security vulnerabilities associated with the usage of Wi-Fi networks. Wireless technologies operate without the physical and logical boundaries of their wired equivalents, putting the network infrastructure and users at risk (3) . 5G networks confront a multitude of dangers.…”
Section: Fig 1 5g Network and Issuesmentioning
confidence: 99%