Proceedings of the 2nd International Conference on Business and Information Management 2018
DOI: 10.1145/3278252.3278262
|View full text |Cite
|
Sign up to set email alerts
|

The Performance of Blum-Blum-Shub Elliptic Curve Pseudorandom Number Generator as WiFi Protected Access 2 Security Key Generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…According to [13], the fact that Wi-Fi networks or WLAN technology rely on radio frequency technology for the transmission of connection is associated with a wide range of security vulnerabilities. Its broadcast nature makes it easy even for the tra c that has already been encrypted to intercepted with ease making it vulnerable to attacks like jamming and eavesdropping [13]. Nonetheless, the security challenges that have thus far been linked with these Wi-Fi networks have not been su cient to constraint the need for the establishment of ubiquitous connectivity.…”
Section: A Security Keysmentioning
confidence: 99%
See 3 more Smart Citations
“…According to [13], the fact that Wi-Fi networks or WLAN technology rely on radio frequency technology for the transmission of connection is associated with a wide range of security vulnerabilities. Its broadcast nature makes it easy even for the tra c that has already been encrypted to intercepted with ease making it vulnerable to attacks like jamming and eavesdropping [13]. Nonetheless, the security challenges that have thus far been linked with these Wi-Fi networks have not been su cient to constraint the need for the establishment of ubiquitous connectivity.…”
Section: A Security Keysmentioning
confidence: 99%
“…They include computer hacking, nancial heists, identity theft, and so forth. The major concern here is that these activities are mainly encouraged by poor security behavior and practices as well as a weak understanding of the whole idea of internet security and its effects [13].…”
Section: A Security Keysmentioning
confidence: 99%
See 2 more Smart Citations
“…In article [30], the Wi-Fi Protected Access 2 (WPA2), which exists in wireless routers, was assumed to follow a more secure security protocol for networks, although partial key vulnerability was exposed. The strength of BBS lies in IFP, whereas PRNG strength lies in DLP.…”
Section: Related Workmentioning
confidence: 99%