WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH

dc.contributor.authorMwathi, David Gitonga
dc.date.accessioned2021-08-23T10:21:29Z
dc.date.available2021-08-23T10:21:29Z
dc.date.issued2019-01
dc.descriptionAbstracten_US
dc.description.abstractThis paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of selected WLAN security features and configurations.en_US
dc.identifier.citationInternational Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 01, Volume 6 (January 2019)en_US
dc.identifier.issn2393-9842
dc.identifier.uridoi://10.26562/IRJCS.2019.JACS10084
dc.identifier.urihttp://repository.chuka.ac.ke/handle/chuka/9260
dc.language.isoenen_US
dc.subjectTrusted computing baseen_US
dc.subjectWLAN Securityen_US
dc.subjectWLAN Authenticationen_US
dc.subjectWLAN attacksen_US
dc.subjectvulnerabilitiesen_US
dc.titleWLAN SECURITY: A TRUSTED COMPUTING BASE APPROACHen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Abstract.pdf
Size:
6.74 KB
Format:
Adobe Portable Document Format
Description:
Abstract

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: