The Community for Technology Leaders
Green Image
Issue No. 07 - July (2005 vol. 38)
ISSN: 0018-9162
pp: 28-34
Kjell J. Hole , University of Bergen
Erlend Dyrnes , Ernst & Young--Bergen
Per Thorsheim , EDB Business Partner
Hackers can decrypt and read data on a wireless link protected by built-in WEP encryption, and they may even be able to access the data on a wired network through a Wi-Fi access point. The authors assess Wi-Fi network security in one city, analyze alternative security techniques, and suggest ways to secure such networks.
Wi-Fi networks, wireless security, wireless hacking, virtual private networks

E. Dyrnes, K. J. Hole and P. Thorsheim, "Securing Wi-Fi Networks," in Computer, vol. 38, no. , pp. 28-34, 2005.
94 ms
(Ver 3.3 (11022016))