최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.12 no.6, 2023년, pp.197 - 208
은태영 (서강대학교 컴퓨터공학과) , (서강대학교 컴퓨터공학과) , 박수용 (서강대학교 컴퓨터공학부)
In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a ...
D. J. Feher and B. Sandor, "Effects of the WPA2 KRACK?attack in real environment," IEEE 16th International?Symposium on Intelligent Systems and Informatics (SISY).?2018.
V. O. Etta, A. Sari, A. L. Imoize, P. K. Shukla, and M.?Alhassan, "Assessment and Test-case Study of Wi-Fi?Security through the Wardriving Technique," Article in?Mobile Information Systems. 2022.
T. Eun and S. Park, "Introduction to attack methods of?locally accessible private blockchain," Korea Computer?Congress 2022 (KCC 2023), pp.1276-1278, 2022.
S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash?system," [Internet], https://assets.pubpub.org/d8wct41f/31611263538139.pdf, 2008.
V. Buterin. "A next generation smart contract & decentralized application platform," [Internet], https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf, 2013.
E. Baray and N. Kimar Ojha. "WLAN security protocols?and WPA3 security approach measurement through?aircrack-ng technique," International Conference on?Computing Methodologies and Communication (ICCMC).?2021.
L. G. Nikolov, "Wireless network vulnerabilities estimation," Security & Future, Vol.2, No.2, pp.80-82, 2018.
C. D. Omorog, B. D. Gerardo, and R. P. Medina. "The performance of blum-blum-shub elliptic curve pseudorandom?number generator as WiFi protected access 2 security key?generator," Proceedings of the 2nd International Conference on Business and Information Management (ICBIM),?2018.
J. Guo, M. Wang, H. Zhang, and Y. Zhang, "A secure?session key negotiation scheme in WPA2-PSK networks,"?IEEE Wireless Communications and Networking Conference (WCNC), 2020.
V. L. L. Thing, "IEEE 802.11 network anomaly detection?and attack classification: A deep learning approach," IEEE?Wireless Communications and Networking Conference?(WCNC), 2017.
U. Chatterjee, R. Sadhukhan, D. Mukhopadhyay, R.?Chakraborty, D. Mahata, and M. Pranhu, "Stupify: A?hardware countermeasure of KRACKs in WPA2 using?physically unclonable functions," Companion Proceedings?of the Web Conference 2020, 2020.
Y. Niu, L. Wei, C. Zhang, J. Liu, and Y. Fang, "An anonymous and accountable authentication scheme for Wi-Fi?hotspot access with the Bitcoin blockchain," IEEE/CIC?International Conference on Communications in China?(ICCC), 2017.
Wi-Fi Alliance, "WPA3 AND ENHANCED OPEN: NEXT?GENERATION WI-FI SECURITY," ARUBA [Internet],?https://www.arubanetworks.com/assets/wp/WP_WPA3-Enhanced-Open.pdf, 2018.
Weyl, Eric Glen and Ohlhaver, Puja and Buterin, Vitalik.?"Decentralized Society: Finding Web3's Soul," Social?Science Research Network (SSRN) [Internet], https://papers.ssrn.com/sol3/papers.cfm?abstract_id4105763,?2022.?
※ AI-Helper는 부적절한 답변을 할 수 있습니다.