Suchergebnisse - "Extensible Authentication Protocol (EAP"
-
1
Autoren: et al.
Quelle: IEEE Transactions on Industrial Informatics. 19:1343-1355
Schlagwörter: extensible authentication protocol (EAP), network security, authentication, formal verification, wireless local area network (WLAN)
Dateibeschreibung: application/pdf
Zugangs-URL: http://urn.fi/urn:nbn:fi-fe2023030229190
-
2
Autoren: et al.
Schlagwörter: authentication, extensible authentication protocol (EAP), formal verification, network security, wireless local area network (WLAN)
Dateibeschreibung: application/pdf
Verfügbarkeit: http://urn.fi/urn:nbn:fi-fe2023030229190
-
3
Autoren:
Quelle: Tongxin xuebao, Vol 35, Pp 1-7 (2014)
Schlagwörter: system wide information management (SWIM), Diameter protocol, extensible authentication protocol (EAP), message-digest (MD) algorithm, identity authentication, Telecommunication, TK5101-6720
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
4
Autoren:
Weitere Verfasser:
Schlagwörter: Extensible Authentication Protocol (EAP), zero-knowledge proofs, authentication, cryptography, key-stretching, passwords authentication, quadratic residuosity problem, razširljivi aventikacijski protokol (EAP), dokazi ničelnega znanja, avtentifikacija, kriptografija, raztegovanje ključev, gesla, problem kvadratnih ostankov, info:eu-repo/classification/udc/004.7
Dateibeschreibung: application/pdf; text/url
Relation: https://repozitorij.upr.si/IzpisGradiva.php?id=18664; https://repozitorij.upr.si/Dokument.php?id=30299&dn=; https://repozitorij.upr.si/Dokument.php?id=27048&dn=; https://plus.cobiss.net/cobiss/si/sl/bib/120058883
-
5
Autoren:
Quelle: Jurnal Inovasi dan Kewirausahaan
Schlagwörter: Indonesia, ad hoc, Extensible Authentication Protocol (EAP), IEEE 802.1X, Authentication
Dateibeschreibung: application/pdf
Verfügbarkeit: https://www.neliti.com/publications/119953/eap-based-authentication-for-ad-hoc-network
-
6
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Authentication, Extensible Authentication Protocol (EAP, IEEE 802.1x, IEEE 802.11i, Wireless LAN, Security CONTENTS
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.537.7797; http://www.ccrc.nthu.edu.tw/tech/WIRE1x_2_0_no_cover.pdf
-
7
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Authentication, IEEE 802.1x, Extensible Authentication Protocol (EAP, EAP-SIM, Wireless LANs, Security 1 Table of Contents
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.496.9204; http://www.ccrc.nthu.edu.tw/tech/WIRE1x_SIM_module_no_cover.pdf
-
8
Autoren:
Weitere Verfasser:
Schlagwörter: zero-knowledge proofs, cryptography, raztegovanje ključev, quadratic residuosity problem, problem kvadratnih ostankov, passwords authentication, key-stretching, gesla, avtentifikacija, Extensible Authentication Protocol (EAP), razširljivi aventikacijski protokol (EAP), authentication, dokazi ničelnega znanja, kriptografija
Dateibeschreibung: text/url
-
9
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Authentication, Extensible Authentication Protocol (EAP, IEEE 802.1x, IEEE 802.11i, Wire- less LANs, Security
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.1985; http://www.ccrc.nthu.edu.tw/tech/2005101.pdf
-
10
Autoren: et al.
Weitere Verfasser: et al.
Quelle: e-Archivo. Repositorio Institucional de la Universidad Carlos III de Madrid
Universidad Carlos III de Madrid (UC3M)
instnameSchlagwörter: Android (Sistema operativo), Control de acceso, Bluetooth Low Energy, Extensible Authentication Protocol (EAP), Redes informáticas
Dateibeschreibung: application/pdf
-
11
Autoren: Lin, Yi-Hui
Thesis Advisors: Shiuh-Jeng Wang, Chun-I Fan, Chu-Hsing Lin, Chung-Huang Yang, Wen-Tsuen Chen, Wen-Shenq Juang, Chih-Hung Wang
Schlagwörter: Wireless Local Area Networks (WLANs), Wired and Wireless Security, Model Checking, Standard Reduction, Formal Security Proofs, Lightweight Devices, Authentication, Passwords, Smart Cards, Forward Secrecy, Extensible Authentication Protocol (EAP), Biometric Privacy
Dateibeschreibung: application/pdf
-
12
Autoren: Chen, Yung-Chih
Thesis Advisors: D. J. Guan, Chun-I Fan, Wen-Shenq Juang, Chung-Huang Yang
Schlagwörter: Extensible Authentication Protocol (EAP), Lightweight Computation, Wireless Local Area Networks (WLANs), Three-Factor Authentication, Forward Secrecy
Dateibeschreibung: application/pdf
-
13
Autoren:
Weitere Verfasser:
Schlagwörter: initial &, Handover authentication phase, Key generation. Keywords WiMAX, Group, Handover authentication, Extensible Authentication Protocol (EAP, Key generation
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.673.5913; http://research.ijcaonline.org/iciiioes/number11/iciiioes1364.pdf
-
14
Autoren:
Schlagwörter: Extensible Authentication Protocol (EAP), IPSec, Remote Access, VPN (Virtual Private Networking)
Relation: Vol. 4, No. 2, 2011;1-4 hal.; http://repository.uinjkt.ac.id/dspace/handle/123456789/31555
Verfügbarkeit: http://repository.uinjkt.ac.id/dspace/handle/123456789/31555
-
15
Autoren:
Weitere Verfasser:
Schlagwörter: Extensible Authentication Protocol (EAP), Tunneled Transport Layer Security (TTLS), Microsoft Challenge Handshake Authentication Protocol version 2 (MSCHAPv2), Protokol Otentikasi, Jaringan Wireless.
Relation: 0111-10-9952;1484 TI s; http://repository.uinjkt.ac.id/dspace/handle/123456789/5397
Verfügbarkeit: http://repository.uinjkt.ac.id/dspace/handle/123456789/5397
Full Text Finder
Nájsť tento článok vo Web of Science