Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,613,914 papers from all fields of science
Search
Sign In
Create Free Account
Extensible Authentication Protocol
Known as:
EAP-TTLS
, Generic Token Card
, EAP-TLS
Expand
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections. It is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Authentication
Authentication protocol
Certificate authority
Cloud load balancing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Tunnel Extensible Authentication Protocol (TEAP) Version 1
Hao Zhou
,
Nancy Cam-Winget
,
J. Salowey
,
S. Hanna
Request for Comments
2014
Corpus ID: 29886480
This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that…
Expand
2011
2011
Extensible Authentication Protocol
Edv Informatik
2011
Corpus ID: 67281625
In EAP [1], the party demanding proof of authentication is called the authenticator and the party being authenticated is called…
Expand
2008
2008
If-conditionals in medical discourse: From theory to disciplinary practice
Shirley Carter-Thomas
,
Elizabeth Rowley-Jolivet
2008
Corpus ID: 144575488
2008
2008
Security Analysis and Authentication Improvement for IEEE 802.11i Specification
Xinyu Xing
,
E. Shakshuki
,
D. Benoit
,
T. Sheltami
IEEE GLOBECOM - IEEE Global Telecommunications…
2008
Corpus ID: 11454190
The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount…
Expand
2008
2008
Performance Analysis and Optimization of Parallel Scientific Applications on CMP Cluster Systems
Xingfu Wu
,
V. Taylor
,
Charles W. Lively
,
S. Sharkawi
International Conference on Parallel Processing
2008
Corpus ID: 12560378
Chip multiprocessors (CMP) are widely used for high performance computing. Further, these CMPs are being configured in a…
Expand
2005
2005
Measuring performance impact of security protocols in wireless local area networks
A. K. Agarwal
,
Wenye Wang
2nd International Conference on Broadband…
2005
Corpus ID: 376162
In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and…
Expand
Review
2003
Review
2003
Ionic liquids and polypyrrole helix tubes: bringing the electronic Braille screen closer to reality
G. Spinks
,
G. Wallace
,
Jie Ding
,
Dezhi Zhou
,
Binbin Xi
,
J. Gillespie
SPIE Smart Structures and Materials…
2003
Corpus ID: 111197328
There is a great need to develop a computer screen based on Braille technology that allows blind people to access computer-based…
Expand
1998
1998
Gran Telescopio Canarias: current status of its optical design and optomechanical support system
L. Jochum
,
J. Castro
,
N. Devaney
Astronomical Telescopes and Instrumentation
1998
Corpus ID: 122233421
The conceptual design of the GTC optical system was completed in summer of 1997. It will be a Richey Cretien type telescope with…
Expand
1998
1998
Electroactive Polymer Actuators as Artificial Muscles for Space Applications
Y. Bar-Cohen
,
T. Xue
,
M. Shahinpoor
,
J. Simpson
,
Joseph G. Smith
1998
Corpus ID: 137504051
1996
1996
Cultivar and Maturity Effects on Muskmelon ( Cucumis melo) Colour, Texture and Cell Wall Polysaccharide Composition
Valencius Simandjuntak
,
D. Barrett
,
R. Wrolstad
1996
Corpus ID: 4683850
Cell wall polysaccharides (CWP) of two types of melons were isolated and purified. Fractionations were performed using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE