Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Tien-Ho Chang"'
Autor:
Tien-Ho Chang, 張添賀
97
MWCNT (Multi-walled carbon nanotube) have many advantages like excellent mechanical properties, perfect tubular structure, and self-lubricant effect. When MWCNTs are distributed evenly inside the substrate, the mechanical properties of the co
MWCNT (Multi-walled carbon nanotube) have many advantages like excellent mechanical properties, perfect tubular structure, and self-lubricant effect. When MWCNTs are distributed evenly inside the substrate, the mechanical properties of the co
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/12681570065985260313
Publikováno v:
AsiaJCIS
Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This e
Publikováno v:
DSC
The development of Wi-Fi application is on its high leap in various aspects, and its security can't be ignored by the kinds of attack methods. The best way to take control of the AP (Access Point) is get the password, which is easier to crack it by t
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811078491
MobiSec
MobiSec
The encryption of WPA & WPA2 is the present and security protection for the wireless LAN. With the vigorous development of parallel computing (GPU), the speed of cryptanalysis is rising up and getting more popular which causes the great threat to the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7730a825dcad29f3642783ae05607de0
https://doi.org/10.1007/978-981-10-7850-7_11
https://doi.org/10.1007/978-981-10-7850-7_11
Publikováno v:
Intelligent Automation and Soft Computing. -1
Autor:
Chia-Mei Chen, Tien-Ho Chang
Publikováno v:
AsiaJCIS
The development of kinds of mobile device is a nonlinear but in a tremendous hopping way. The security of wireless LAN is far more important, and its mainly present protection is the WPA a WPA2 protocol which is a complex tough algorithm. This explor
Publikováno v:
Intelligent Automation & Soft Computing; Mar2019, Vol. 25 Issue 1, p183-192, 10p