Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/182
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seyidova, Irada | - |
dc.contributor.author | Karatova, Diana | - |
dc.date.accessioned | 2023-12-14T07:39:33Z | - |
dc.date.available | 2023-12-14T07:39:33Z | - |
dc.date.issued | 2023-05-11 | - |
dc.identifier.uri | http://dspace.azjhpc.org/xmlui/handle/123456789/182 | - |
dc.description.abstract | WPA (Wi-Fi Protected Access) to WPA2 and now WPA3 wireless network security protocols have substantially improved encryption algorithms, authentication procedures, and overall security.(1) Understanding the key differences between these protocols is crucial for securing wireless networks in today's digital environment. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azərbaycan Dövlət Neft və Sənaye Universiteti | en_US |
dc.subject | WPA | en_US |
dc.subject | WPA2 | en_US |
dc.subject | WPA3 | en_US |
dc.subject | wireless network security | en_US |
dc.subject | encryption protocols | en_US |
dc.subject | authentication methods | en_US |
dc.title | Comparative Analysis of Wpa, Wpa2, And Wpa3 | en_US |
dc.type | Book | en_US |
dc.source.journaltitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.volume | 1 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 21 | en_US |
dc.source.endpage | 22 | en_US |
Appears in Collections: | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Industy_4-21-22.pdf | 201.71 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.