Skip to search formSkip to main contentSkip to account menu

Protected Extensible Authentication Protocol

Known as: PEAP, Protected EAP, EAP-MSCHAPv2 
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
portuguesO Processo Especial de Revitalizacao e o Processo Especial para Acordo de Pagamento impedem os credores de instaurar… 
2014
2014
The cyanobacterium Arthrospira platensis has been considered as a potential source of several therapeutic compounds including… 
2012
2012
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of… 
2009
2009
Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and… 
2008
2008
Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an… 
2007
2007
Shortage of human resource for health poses a major challenge to achieving the millennium development goals. Uganda is among the… 
2005
2005
The majority of the authentication methods used in modern wireless local area networks (WLANs) are inherited from protocols… 
2005
2005
Wireless LAN (WLAN) is a wireless network which provides connectivity in a limited area; IEEE 802.11 is the most widespread… 
2005
2005
39 participatorylearningandaction 51April2005 Introduction The need for developing a poverty eradication plan in Uganda grew out… 
1989
1989
Presentamos los principios metodologia y resultados de la monitorizacion continua de la funcion del tronco cerebral por medio de…