2005
DOI: 10.1109/mc.2005.241
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wi-Fi networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 1 publication
0
20
0
Order By: Relevance
“…In WiFi networks, this problem is known as the rogue access point problem [12]. When we informally surveyed a number of femtocell offerings, we found no evidence of systems that require authorisation from devices' users.…”
Section: Discussionmentioning
confidence: 86%
“…In WiFi networks, this problem is known as the rogue access point problem [12]. When we informally surveyed a number of femtocell offerings, we found no evidence of systems that require authorisation from devices' users.…”
Section: Discussionmentioning
confidence: 86%
“…On one hand, it keeps the cost of the stage low, and on the other, it makes it more hackable. There are likewise a couple non-Linux OS choices accessible [9]. The extra equipment and programming necessities can be accomplished by effectively existing equipment modules and open source programming.…”
Section: 1selecting the Distributionmentioning
confidence: 99%
“…The CPU is the primary part of the Raspberry Pi, in charge of doing the directions of a PC program through numerical and legitimate operations. The processor of Raspberry Pi is a 32 bit, 700 MHz System on a Chip (SoC), which is based on the ARM11 design and can be overclocked for more power [9]. ARM chips arrive in an assortment of designs with various centers arranged to give distinctive capacities at various value focuses.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
See 1 more Smart Citation
“…However, some portals offer only authentication without any encryption of password or user data. It is very important to make sure that the portal offers an adequate security service [25].…”
Section: Securing a Wireless Lanmentioning
confidence: 99%