نتایج جستجو برای: eap

تعداد نتایج: 1364  

Journal: :RFC 2003
Bernard Aboba Pat R. Calhoun

This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing...

2004
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addit...

2004
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA-256 instead of ...

2004
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the name of the access network to the keys derived within the method. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs a new hash function...

Journal: :Journal of the American Veterinary Medical Association 2010
Jean G F Joaquim Stelio P L Luna Juliana T Brondani Sandra R Torelli Sheila C Rahal Fernando de Paula Freitas

OBJECTIVE To compare the effects of decompressive surgery (DSX), electroacupuncture (EAP), and DSX followed by EAP (DSX + EAP) for the treatment of thoracolumbar intervertebral disk disease (IVDD) in dogs with severe neurologic deficits of > 48 hours' duration. DESIGN Retrospective case series and prospective clinical trial. ANIMALS 40 dogs between 3 and 6 years old and weighing between 10 ...

2006
Athanasios N. Athanasopoulos Matina Economopoulou Valeria V. Orlova Astrid Sobke Darius Schneider Holger Weber Hellmut G. Augustin Sabine A. Eming Uwe Schubert Thomas Linn Peter P. Nawroth Muzaffar Hussain Hans-Peter Hammes Mathias Herrmann Klaus T. Preissner Triantafyllos Chavakis

Staphylococcus aureus is a major human pathogen interfering with host-cell functions. Impaired wound healing is often observed in S aureus–infected wounds, yet, the underlying mechanisms are poorly defined. Here, we identify the extracellular adherence protein (Eap) of S aureus to be responsible for impaired wound healing. In a mouse wound-healing model wound closure was inhibited in the presen...

Journal: :IACR Cryptology ePrint Archive 2017
Håkon Jacobsen

We conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. EAP is often found in enterprise networks where it allows a client and an authenticator to establish a shared key with the help of a mutually trusted server. Considered as a three-party authenticated key exchange protocol, we show that the general E...

Journal: :RFC 2004
Russ Housley Tim Moore

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

2007
P. Eronen

The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditio...

2004
T. Moore

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید