Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Protected Extensible Authentication Protocol

Known as: PEAP, Protected EAP, EAP-MSCHAPv2 
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Perkembangan teknologi jaringan nirkabel memungkinkan kita melakukan komunikasi tanpa harus dibatasi oleh panjangnya kabel. Namun… Expand
Highly Cited
2013
Highly Cited
2013
Funkcionalna i institucionalna složenost javnog sektora implicira i vrlo složenim sustavom upravljanja. Nemogucnost primjene… Expand
2010
2010
In the context of a growing concern for data security, network access control has become an important part of every network… Expand
  • figure 1
  • table I
  • figure 3
  • figure 4
  • figure 5
2008
2008
In this paper, the challenges involved in authentication over wireless networks including wireless LANs, IEEE 802.11, and WIMAX… Expand
  • table 1
Review
2008
Review
2008
Based on an account of how two classes of primary five students in Singapore engage in the learning of English, Mathematics and… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
2007
2007
This paper presents the details of a Single Sign On proposal which takes advantage of previously deployed authentication… Expand
2007
2007
Uganda’s economy has undergone major fluctuations from a vibrant economy in the 1960s, to suffering severe macroeconomic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
An effective state is essential to achieving socio-economic and sustainable development. With the advent of globalization, there… Expand
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
Highly Cited
2004
Highly Cited
2004
The Extensible Authentication Protocol (EAP) provides for support of multiple authentication methods. This document defines the… Expand
Review
2003
Review
2003
This paper explores how political actors, processes, debates and institutions influence the reduction and reproduction of chronic… Expand