Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,156 papers from all fields of science
Search
Sign In
Create Free Account
Extensible Authentication Protocol
Known as:
EAP-TTLS
, Generic Token Card
, EAP-TLS
Expand
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections. It is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authentication
Authentication protocol
Certificate authority
Cloud load balancing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Employability skills of technical college graduates : a case study for Government Technical College (GTC) in Ahoada Rivers State Nigeria.
Dagogo William Legg-Jack
2014
Corpus ID: 157273997
2011
2011
Extensible Authentication Protocol
Edv Informatik
2011
Corpus ID: 67281625
In EAP [1], the party demanding proof of authentication is called the authenticator and the party being authenticated is called…
Expand
2009
2009
Becoming a proficient academic writer: shifting lexical preferences in the use of the progressive
Stefanie Wulff
,
U. Römer
2009
Corpus ID: 15588038
Recent corpus studies have shown that learners of English are aware of systematic associations between verbs and their preferred…
Expand
2008
2008
Security Analysis and Authentication Improvement for IEEE 802.11i Specification
Xinyu Xing
,
E. Shakshuki
,
D. Benoit
,
T. Sheltami
IEEE GLOBECOM - IEEE Global Telecommunications…
2008
Corpus ID: 11454190
The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount…
Expand
2007
2007
Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis
E. Yuksel
2007
Corpus ID: 9146989
The IEEE 802.16e-2005 specification provides an air interface standard for metropolitan area wireless broadband service. IEEE 802…
Expand
2005
2005
Measuring performance impact of security protocols in wireless local area networks
A. K. Agarwal
,
Wenye Wang
2nd International Conference on Broadband…
2005
Corpus ID: 376162
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and…
Expand
Review
2003
Review
2003
Ionic liquids and polypyrrole helix tubes: bringing the electronic Braille screen closer to reality
G. Spinks
,
G. Wallace
,
Jie Ding
,
Dezhi Zhou
,
Binbin Xi
,
J. Gillespie
SPIE Smart Structures and Materials…
2003
Corpus ID: 111197328
There is a great need to develop a computer screen based on Braille technology that allows blind people to access computer-based…
Expand
2003
2003
Extensible Authentication Protocol (EAP) over PPP
Xiong Haiquan
2003
Corpus ID: 64204544
Extensible authentication protocol is a gerenal authentication protocol over PPP. It can support a lot of authentication…
Expand
2001
2001
Discipline specificity and EAP.
C. Clapham
2001
Corpus ID: 59677574
Introduction It is the custom in learner-centred EAP classes for teachers to give students a choice of topics to study. Some…
Expand
1998
1998
Electroactive Polymer Actuators as Artificial Muscles for Space Applications
Y. Bar-Cohen
,
T. Xue
,
M. Shahinpoor
,
J. Simpson
,
Joseph G. Smith
1998
Corpus ID: 137504051
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE