Thumbnail
Access Restriction
Subscribed

Author Berghel, Hal ♦ Uecker, Jacob
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Assessing the extent of the security risks involved in wireless networking technology by considering three possible scenarios demonstrating vulnerabilities.
Description Affiliation: National Identity Theft and Financial Fraud Research and Operations Center (Uecker, Jacob) || University of Nevada at Las Vegas School of Computer Science, and the National Identity Theft and Financial Fraud Research and Operations Center (Berghel, Hal)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 47
Issue Number 12
Page Count 6
Starting Page 15
Ending Page 20


Open content in new tab

   Open content in new tab
Source: ACM Digital Library