Author of the publication

A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
DOI: doi://10.26562/IJIRIS.2019.JAIS10082

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mwathi,
add a person with the name Mwathi,
 

Other publications of authors with the same name

A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..