Learn More
— On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks such as the receptionist and/or locked doors. In the case of a wireless local area network (WLAN), the signal propagation is not limited by a fixed boundary, and unauthorized(More)
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks such as the receptionist and/or locked doors. In the case of a wireless local area network (WLAN), the signal propagation is not limited by a fixed boundary, and unauthorized access(More)
D e p ar t m e nt of I nf or m a t i o n T e c hnol og y, De l hi T ec hn ol o gi c al U ni ve r s i t y E-Learning is the fastest and inexpensive source of information today. Thousands of the people today are using electronic gadgets for accessing E day is getting popularity because of its unlimited benefits. A person, sitting anywhere around the globe can(More)
Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used. It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period. This paper, focus on the(More)
  • 1