dc.contributor.author | Mwathi, David Gitonga | |
dc.date.accessioned | 2021-08-23T10:21:29Z | |
dc.date.available | 2021-08-23T10:21:29Z | |
dc.date.issued | 2019-01 | |
dc.identifier.citation | International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 01, Volume 6 (January 2019) | en_US |
dc.identifier.issn | 2393-9842 | |
dc.identifier.uri | doi://10.26562/IRJCS.2019.JACS10084 | |
dc.identifier.uri | http://repository.chuka.ac.ke/handle/chuka/9260 | |
dc.description | Abstract | en_US |
dc.description.abstract | This paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of selected WLAN security features and configurations. | en_US |
dc.language.iso | en | en_US |
dc.subject | Trusted computing base | en_US |
dc.subject | WLAN Security | en_US |
dc.subject | WLAN Authentication | en_US |
dc.subject | WLAN attacks | en_US |
dc.subject | vulnerabilities | en_US |
dc.title | WLAN SECURITY: A TRUSTED COMPUTING BASE APPROACH | en_US |
dc.type | Article | en_US |