نتایج جستجو برای: eap

تعداد نتایج: 1364  

2008
D. Forsberg

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document defines the Protoc...

2007
Myung-Sun Kim Radim Bartoš Scott A. Valcourt

There are many methods that support user authentication and access control, important roles in the establishment of secure communication. Particularly, we examine Simple Authentication and Security Layer (SASL) and Extensible Authentication Protocol (EAP) and propose EAP-Advanced Encryption Standard-Pre-Shared-Key (EAP-AESPSK). SASL is an authentication framework in connection-oriented protocol...

2000
Yoseph Bar-Cohen

For many years, electroactive polymers (EAP) received relatively little attention due to the small number of available materials and their limited actuation capability. The recent emergence of EAP materials with large displacement response changed the paradigm of these materials and their potential capability. The main attractive characteristic of EAP is their operational similarity to biologic...

2008
M. Abdul Alim Behçet Sarikaya

We present the design, implementation and simulation of a security protocol based on Extensible Authentication Protocol nick-named EAP-Sens for wireless sensor networks. We use the generalized pre-shared key authentication method for authentication and key establishment. Standard EAP model is used for authenticating sensor nodes within the radio range of the authenticator. For distant nodes, we...

2002
Yoseph Bar-Cohen

In the last ten years, new EAP materials have emerged that exhibit large displacement in response to electrical stimulation enabling great potential for the field. To develop efficient and robust EAP material for practical applications efforts are underway to understand the behavior of EAP materials and improved characterization techniques. Further, to enhance the actuation force the basic prin...

2011
Y. Sheffer G. Zorn

The Extensible Authentication Protocol (EAP) describes a framework that allows the use of multiple authentication mechanisms. This document defines an authentication mechanism for EAP called EAP-EKE, based on the Encrypted Key Exchange (EKE) protocol. This method provides mutual authentication through the use of a short, easy to remember password. Compared with other common authentication metho...

2007
P. Eronen

The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditio...

2006
Lei Han Michel Barbeau

Acknowledgement I wish to express my sincere gratitude to Professor Michel Barbeau, my supervisor, for his encouragement and guidance during the course of this project. Thank you for always being there and helping me whenever I needed. ii Abstract Security is always a major concern for wireless LAN development. This type of development is suffering today from different security problems due to ...

2010
Zohreh R. Eslami

EAP plays a highly important role in countries where English is used mainly for academic purposes. However, EAP programs have been developed without conducting a systematic needs analysis from both the students’ and instructors’ perspective. The purpose of this study is to describe the perception that EAP students and instructors have of the problematic areas in EAP programs. A total of 693 EAP...

2006
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید