A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Prevention of DoS and Memory Exhaustion Attacks: Key Distribution with Confidentiality and Authentication
2012
International Journal of Computer Applications
Now a day's most of the organizations are moving from wireconnected LAN to wireless LAN. The popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with simplicity and convenience. But, there are many security issues which have been identified in the operation of 802.11 networks, and the 802.11i protocol has been announced to protect these types of networks. 802.11i protocol security has with a focus on an active attack and a passive attack.
doi:10.5120/9365-3812
fatcat:2g444qgyg5gzxaac6jdjbkihwm