Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol

@article{Youssef2012SecuringAO,
  title={Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol},
  author={M. Youssef and H. El-Gendy},
  journal={Advanced Computing: An International Journal},
  year={2012},
  volume={3}
}
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, primarily, that mechanism relies on securing communication authentication. In order to do that, the… Expand
5 Citations

References

SHOWING 1-10 OF 36 REFERENCES
Applying open networks communication authentication
  • 3
Internet Security
  • 34
  • PDF
Network Security Fundamentals
  • S. Graham, X. Fu, Bin Lu
  • Engineering, Computer Science
  • Wiley Encyclopedia of Computer Science and Engineering
  • 2008
  • 13
Securing computer networks communication by modifying computer network communication protocols
  • M. Youssef
  • Computer Science
  • 2011 11th International Conference on ITS Telecommunications
  • 2011
  • 4
PPP Challenge Handshake Authentication Protocol (CHAP)
  • 284
  • PDF
The Complete Guide to Internet Security
  • 15
Authentication: From Passwords to Public Keys
  • 189
Network Security Fundamentals
  • 22
Designing Network Security
  • 56
  • PDF
Computer Networking Essentials
  • 18
...
1
2
3
4
...