Limpar
222 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Manu S. Hegde,

The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. ... methods. In this paper, we have modelled the Extensible Authentication Protocol as a finite state machine. The various entities in our model are Authenticator, EAP Server, User and ...

Tópico(s): Security and Verification in Computing

2012 - | International Journal of Network Security & Its Applications

Artigo Acesso aberto Revisado por pares

Alexei Viacheslavovich Nikeshin, Victor Zinovievich Shnitman,

... In this context, of considerable interest is the Extensible Authentication Protocol (EAP), specified by the IETF in RFC 3748, ... specifications IETF. This article is a review of Extensible Authentication Protocol (EAP) and its methods, specified by IETF. EAP ...

Tópico(s): Advanced

2018 - Institute for System Programming of the Russian Academy of Sciences (ISPRAS) | Proceedings of the Institute for System Programming of RAS

Artigo

Jyh‐Cheng Chen, Yu-Ping Wang,

This article presents the technical details of the Extensible Authentication Protocol (EAP) and IEEE 802.1x by using WIRE1x, ...

Tópico(s): Bluetooth and Wireless Communication Technologies

2005 - Institute of Electrical and Electronics Engineers | IEEE Communications Magazine

Artigo Acesso aberto Revisado por pares

Min‐Gu Lee, Dongwan Kim, Jin-Soo Sohn,

... 능동형 인증 방식을 제공할 수 있는 방법으로 EAP(Extensible Authentication Protocol)과 AAA(Authentication. Authorization and Accounting) 규약을 활용하는 ... mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.

Tópico(s): Advanced

2012 - THE KOREAN INSTITUTE OF COMMUNICATIONS AND INFORMATION SCIENCES (KICS) | The Journal of Korean Institute of Communications and Information Sciences

Artigo Acesso aberto Revisado por pares

Marcin Pawłowski, Antonio J. Jara, Maciej Ogorzałek,

... that combines authentication and bootstrapping protocol (TEPANOM) with Extensible Authentication Protocol (EAP) framework optimized for the IEEE 802.15. ...

Tópico(s): Advanced

2015 - IOS Press | Mobile Information Systems

Artigo Acesso aberto Revisado por pares

Alexei Viacheslavovich Nikeshin, Victor Zinovievich Shnitman,

... a model-based approach to conformance testing of Extensible Authentication Protocol (EAP) implementations. Conformance testing is the basic tool ...

Tópico(s): Formal Methods in Verification

2018 - Institute for System Programming of the Russian Academy of Sciences (ISPRAS) | Proceedings of the Institute for System Programming of RAS

Artigo Revisado por pares

Romano Fantacci, Leonardo Maccari, Tommaso Pecorella,

... that are required for authentication protocols, such as Extensible Authentication Protocol Transport Layer Security (EAP-TLS), that require an ...

Tópico(s): Advanced

2007 - Institute of Electrical and Electronics Engineers | IEEE Wireless Communications

Artigo Acesso aberto

Taufik Nur Hidayat, Imam Riadi,

One of the main changes in the field of telecommunications is the use of wireless technology.Wireless technology is also implemented in the Ahmad Dahlan University Campus 3 Research Laboratory environment, better known as wireless LAN (WLAN).Each user within the range of campus research laboratory area Ahmad Dahlan University radiates an access point (AP).Another negative impact is that communication that occurs will be easily intercepted between the security of campus network users.The stages performed ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2021 - | International Journal of Computer Applications

Artigo

Saber Zrelli, Yoichi Shinoda,

... handled separately using authentication frameworks based on the extensible authentication protocol (EAP). The EAP protocol specified by the IETF ... standard for network access control. It provides an extensible, link layer agnostic protocol for carrying various authentication methods. In this paper, we design the integration ...

Tópico(s): Access Control and Trust

2007 - Institute of Electrical and Electronics Engineers | Proceedings

Artigo Revisado por pares

Rafael Marín-López, Yoshihiro Ohba, Fernando Pereñíguez-García, Antonio Skármeta,

The Extensible Authentication Protocol (EAP) has been standardized within the Internet Engineering Task Force (IETF) in order to provide flexible mechanisms ...

Tópico(s): Mobile Agent-Based Network Management

2009 - Elsevier BV | Computer Standards & Interfaces

Artigo Revisado por pares

Yuh‐Min Tseng, Sen‐Shan Huang, Tung‐Tso Tsai, Li Wei Tseng,

... our protocol as an authentication method of the extensible authentication protocol (EAP) for wireless networks.

Tópico(s): User

2015 - Hindawi Publishing Corporation | International Journal of Distributed Sensor Networks

Artigo Acesso aberto

Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Madhusanka Liyanage,

... the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol for WLAN-connected Internet of Things devices is presented. We conduct an informal and formal security analysis ...

Tópico(s): User

2022 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Industrial Informatics

Artigo Revisado por pares

Salekul Islam, J. William Atwood,

... Protocol for Carrying Authentication for Network Access, encapsulating Extensible Authentication Protocol packets, is used to authenticate a sender and ...

Tópico(s): Access Control and Trust

2010 - Elsevier BV | Computer Networks

Artigo Revisado por pares

Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng,

... abolished right now and replaced with more secure Extensible Authentication Protocols. Copyright © 2012 John Wiley & Sons, Ltd.

Tópico(s): Advanced Malware Detection Techniques

2012 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Ram Dantu, Gabriel Clothier, Anuj Atri,

This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs. ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2006 - Elsevier BV | Computer Standards & Interfaces

Artigo

Dan García-Carrillo, Rafael Marín-López,

... We pay attention to the authentication with the extensible authentication protocol (EAP) and CoAP, which has resulted in a ...

Tópico(s): Security in Wireless Sensor Networks

2018 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal

Artigo Revisado por pares

Khidir M. Ali, Thomas Owens,

... a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer ...

Tópico(s): Mobile Ad Hoc Networks

2007 - Inderscience Publishers | International Journal of Information and Computer Security

Artigo Acesso aberto

E. Ramaraj, S. Karthikeya,

... In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process.In fourth layer ...

Tópico(s): Chaos-based Image/Signal Encryption

2006 - Science Publications | Journal of Computer Science

Artigo Revisado por pares

Chun‐I Fan, Yi-Hui Lin, Ruei‐Hau Hsu,

... access resources in Wireless Local Area Networks (WLANs). Extensible Authentication Protocol (EAP) is an authentication framework widely used in ...

Tópico(s): Bluetooth and Wireless Communication Technologies

2012 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Parallel and Distributed Systems

Capítulo de livro

Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Ayad Ibrahim, Ali Noah Yahya, Iman Qays Abduljaleel, Enas Wahab Abood,

... specified authentication and key agreement (5G-AKA), and extensible authentication protocol–improved AKA (EAP-AKA’) in its Release 16( ...

Tópico(s): Advanced Wireless Communication Technologies

2022 - Springer Nature | Algorithms for intelligent systems

Artigo Acesso aberto Revisado por pares

Dan García-Carrillo, Rafael Marín-López,

... federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We ...

Tópico(s): Wireless Body Area Networks

2016 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo Acesso aberto Revisado por pares

Pedro Moreno-Sánchez, Rafa López, Antonio Skármeta,

... Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence ...

Tópico(s): Advanced

2013 - Multidisciplinary Digital Publishing Institute | Sensors

Capítulo de livro Revisado por pares

Chris Brzuska, Håkon Jacobsen,

... conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. ...

Tópico(s): User

2017 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias,

... of attacks hurled in the IEEE 802.1X Extensible Authentication Protocol (EAP) environment. Second, given that all the 802. ...

Tópico(s): Wireless Networks and

2021 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Jesús Sánchez-Gómez, Dan García-Carrillo, Rafael Marín-Pérez, Antonio Skármeta,

... and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO- ...

Tópico(s): Wireless Body Area Networks

2020 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo Revisado por pares

Rafael Marín-López, Fernando Pereñíguez-García, Fernando Bernal, Antonio Skármeta,

... where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and ...

Tópico(s): Cooperative Communication and Network Coding

2010 - Elsevier BV | Computer Networks

Artigo

Yuh‐Min Tseng,

... an authentication framework that is based on the Extensible Authentication Protocol (EAP). When a roaming user wants to access ...

Tópico(s): Mobile Ad Hoc Networks

2006 - Institution of Engineering and Technology | IEE Proceedings - Communications

Artigo

Anastasios N. Bikos, Nicolas Sklavos,

... authentication and ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Authentication and Key Agreement), currently operating within ...

Tópico(s): RFID technology advancements

2013 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy

Artigo Revisado por pares

Zoltán Faigl, Stefan Lindskog, Anna Brunström,

... The studied methods are pre‐shared keys (PSKs), extensible authentication protocol (EAP) using MD5, SIM, TTLS‐MD5, TLS, and ...

Tópico(s): RFID technology advancements

2009 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Pascal Urien, Guy Pujolle,

... strong authentication in IP networks, according to the extensible authentication protocol (EAP). An open software implementation has been released ...

Tópico(s): Mobile Ad Hoc Networks

2008 - Wiley | International Journal of Network Management