Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,541,793 papers from all fields of science
Search
Sign In
Create Free Account
Wi-Fi Protected Access
Known as:
WiFi Protection Access
, Wifi Protected Access
, WPA-PSK
Expand
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Broadcasting (networking)
Brute-force attack
CBC-MAC
Comparison of mobile operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
I/O standard based thermal/energy efficient green communication for Wi-Fi protected access on FPGA
T. Kumar
,
B. Pandey
,
T. Das
,
D. M. A. Hussain
International Conference on Ultra Modern…
2014
Corpus ID: 21021199
In this paper, we analyzed how does life and reliability of an integrated circuit is affected when it is operated in different…
Expand
2013
2013
Wavelet Packet Analysis and Gray Model for Feature Extraction of Hyperspectral Data
Jihao Yin
,
Chaoqun Gao
,
X. Jia
IEEE Geoscience and Remote Sensing Letters
2013
Corpus ID: 21217102
Wavelet packet analysis (WPA) and gray model (GM) are investigated for nonlinear unsupervised feature extraction of hyperspectral…
Expand
2012
2012
WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis and Improvement
A. N. Sakib
,
Shamim Ahmed
,
Samiur Rahman
,
Ishtiaque Mahmud
,
Md. Habibullah Belali
2012
Corpus ID: 67179220
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the…
Expand
2011
2011
Security Improvement of WPA 2 (Wi-Fi Protected Access 2)
A. N. Sakib
,
Fariha Tasmin Jaigirdar
,
Muntasim Munim
,
Armin Akter
2011
Corpus ID: 55969660
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the…
Expand
Review
2010
Review
2010
Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions
Khidir M. Ali
,
T. Owens
International Conference on Telecommunications
2010
Corpus ID: 32003116
The rapid growth of Wi-Fi networks in recent years has driven both industry and the relevant standards body to respond to the…
Expand
2008
2008
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems
S. Narayan
,
S. S. Kolahi
,
Yonathan Sunarto
,
Du D. T. Nguyen
,
Paul Mani
Conference on Communication Networks and Services…
2008
Corpus ID: 14466504
This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless local…
Expand
2008
2008
Addressing the vulnerability of the 4-way handshake of 802.11i
Songhe Zhao
,
C. Shoniregun
,
C. Imafidon
Third International Conference on Digital…
2008
Corpus ID: 14995140
This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze…
Expand
2007
2007
Psychiatry for the person and its ethical perspectives
J. Mezzich
,
G. Christodoulou
2007
Corpus ID: 70667475
Every medical (and psychiatric) act is or should be an ethical act. This is consistent with the fundamental aspirations of the…
Expand
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
1973
1973
Art for the millions : essays from the 1930s by artists and administrators of the WPA Federal Art Project
Francis V. O’Connor
,
F. Art
1973
Corpus ID: 193262720
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE