نتایج جستجو برای: eap documents

تعداد نتایج: 71466  

Journal: :RFC 2012
Katrin Hoeper Stephen R. Hanna Hao Zhou Joseph Salowey

This memo defines the requirements for a tunnel-based Extensible Authentication Protocol (EAP) Method. This tunnel method will use Transport Layer Security (TLS) to establish a secure tunnel. The tunnel will provide support for password authentication, EAP authentication, and the transport of additional data for other purposes. (IETF). It represents the consensus of the IETF community. It has r...

Journal: :International journal of academic research in accounting, finance and management sciences 2022

In 2015, the United Nation Sustainable Development Goals (SDGs) issued 17 initiatives comprising environmental, social and economic initiatives. It leads to implementation environmental auditing practices (INTOSAI, 2006). However, there is no one process for of practices. The purpose this study highlight flow (EAP) in two Malaysian Local Governments (MLG). This used an interpretative qualitativ...

Journal: :IEICE Transactions 2009
Heung Youl Youm

The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU...

Journal: :Journal of studies on alcohol 2001
G A Zarkin J W Bray G T Karuntzos B Demiralp

OBJECTIVE An enhanced employee assistance program (EAP) intervention was developed that delivers comprehensive EAP outreach services to all employees who may have alcohol-related and other workplace problems; standard EAP materials traditionally targeted at white men were enhanced to include women and minorities. This study evaluates whether the enhanced EAP intervention increased EAP utilizati...

Journal: :RFC 2013
Stefan Winter Joseph Salowey

This document updates the Extensible Authentication Protocol (EAP) applicability statement from RFC 3748 to reflect recent usage of the EAP protocol in the Application Bridging for Federated Access Beyond web (ABFAB) architecture. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this d...

Journal: :Biology of reproduction 1994
R S King G J Killian

An oviduct-specific, estrus-associated glycoprotein (EAP) of 85-95 kDa is detectable in both conditioned medium (CM) from oviductal explants and cannula-derived oviductal fluid (ODF). The objectives of this study were to purify EAP from both ODF and CM, to characterize the glycosylation of EAP, and to localize binding of EAP on sperm. EAP was purified from ODF by ammonium sulfate precipitation ...

2002
H. Haverinen

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...

Teaching English for Academic Purposes (EAP) courses is highly demanding for EAP teachers as they are faced with diverse pedagogical and administrative challenges in such courses. This study addressed the level of burnout among EAP teachers and variations in relation to their demographic and organizational characteristics. To this aim, a demographic questionnaire along with the Persian version ...

2010
P. Eronen H. Tschofenig

IKEv2 specifies that Extensible Authentication Protocol (EAP) authentication must be used together with responder authentication based on public key signatures. This is necessary with old EAP methods that provide only unilateral authentication using, e.g., one-time passwords or token cards. This document specifies how EAP methods that provide mutual authentication and key agreement can be used ...

2002

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید