Skip to search formSkip to main contentSkip to account menu

Extensible Authentication Protocol

Known as: EAP-TTLS, Generic Token Card, EAP-TLS 
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections. It is… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that… 
2011
2011
In EAP [1], the party demanding proof of authentication is called the authenticator and the party being authenticated is called… 
2008
2008
The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount… 
2008
2008
Chip multiprocessors (CMP) are widely used for high performance computing. Further, these CMPs are being configured in a… 
2005
2005
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and… 
Review
2003
Review
2003
There is a great need to develop a computer screen based on Braille technology that allows blind people to access computer-based… 
1998
1998
The conceptual design of the GTC optical system was completed in summer of 1997. It will be a Richey Cretien type telescope with… 
1996
1996
Cell wall polysaccharides (CWP) of two types of melons were isolated and purified. Fractionations were performed using…