نتایج جستجو برای: eap research

تعداد نتایج: 1404470  

2010
L. Blunk J. Vollbrecht

This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. EAP typically runs directly over the link layer without requiring IP, but is reliant on lower layer ordering guarantees as in PPP and IEEE 802. EAP does provide its own support for duplicate elimination and retransmission. Fragmentation is not suppor...

2008
D. Forsberg

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document defines the Protoc...

2007
Myung-Sun Kim Radim Bartoš Scott A. Valcourt

There are many methods that support user authentication and access control, important roles in the establishment of secure communication. Particularly, we examine Simple Authentication and Security Layer (SASL) and Extensible Authentication Protocol (EAP) and propose EAP-Advanced Encryption Standard-Pre-Shared-Key (EAP-AESPSK). SASL is an authentication framework in connection-oriented protocol...

2015
Stephen F. Murphy Anthony J. Schaeffer Joseph Done Larry Wong Ashlee Bell-Cohn Kenny Roman John Cashy Michelle Ohlhausen Praveen Thumbikat

Chronic pelvic pain syndrome (CPPS) is the most common form of prostatitis, accounting for 90-95% of all diagnoses. It is a complex multi-symptom syndrome with unknown etiology and limited effective treatments. Previous investigations highlight roles for inflammatory mediators in disease progression by correlating levels of cytokines and chemokines with patient reported symptom scores. It is hy...

2014
Reinhard Huss Mahua Das Bassey Ebenso Bindiya Rawat Obinna Onwujekwe Giuliano Russo Lucie Blok Putthasri Weerasak Tolib Mirzoev

Background Policy-making can be described as a complex decisionmaking process involving different actors engaged in negotiating their interests [1] and promoting different types of evidence. Policy informed by research evidence is widely seen as a good thing. However Monaghan [2] indicated that ‘Policy-makers may fish for evidence, select the beneficial bits and throw back those that are un-req...

2008
M. Abdul Alim Behçet Sarikaya

We present the design, implementation and simulation of a security protocol based on Extensible Authentication Protocol nick-named EAP-Sens for wireless sensor networks. We use the generalized pre-shared key authentication method for authentication and key establishment. Standard EAP model is used for authenticating sensor nodes within the radio range of the authenticator. For distant nodes, we...

2002
Yoseph Bar-Cohen

In the last ten years, new EAP materials have emerged that exhibit large displacement in response to electrical stimulation enabling great potential for the field. To develop efficient and robust EAP material for practical applications efforts are underway to understand the behavior of EAP materials and improved characterization techniques. Further, to enhance the actuation force the basic prin...

2011
Y. Sheffer G. Zorn

The Extensible Authentication Protocol (EAP) describes a framework that allows the use of multiple authentication mechanisms. This document defines an authentication mechanism for EAP called EAP-EKE, based on the Encrypted Key Exchange (EKE) protocol. This method provides mutual authentication through the use of a short, easy to remember password. Compared with other common authentication metho...

2007
P. Eronen

The Extensible Authentication Protocol (EAP), defined in RFC 3748, enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP authentication algorithms, known as "methods". It also provides a detailed system-level security analysis, describing the conditio...

2006
Lei Han Michel Barbeau

Acknowledgement I wish to express my sincere gratitude to Professor Michel Barbeau, my supervisor, for his encouragement and guidance during the course of this project. Thank you for always being there and helping me whenever I needed. ii Abstract Security is always a major concern for wireless LAN development. This type of development is suffering today from different security problems due to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید