A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
An analyzing process on wireless protection criteria focusing on (WPA) within computer network security
2021
Periodicals of Engineering and Natural Sciences (PEN)
Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor
doi:10.21533/pen.v9i1.1796
fatcat:52ryrnhyzvhsjfsaakhqc4i66m