Protected Extensible Authentication Protocol

Known as: PEAP, Protected EAP, EAP-MSCHAPv2 
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Perkembangan teknologi jaringan nirkabel memungkinkan kita melakukan komunikasi tanpa harus dibatasi oleh panjangnya kabel. Namun… Expand
Is this relevant?
2012
2012
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of… Expand
  • figure 2
  • figure 3
Is this relevant?
2008
2008
In this paper, the challenges involved in authentication over wireless networks including wireless LANs, IEEE 802.11, and WIMAX… Expand
  • table 1
Is this relevant?
2007
2007
This paper presents the details of a Single Sign On proposal which takes advantage of previously deployed authentication… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
An effective state is essential to achieving socio-economic and sustainable development. With the advent of globalization, there… Expand
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The Extensible Authentication Protocol (EAP) provides for support of multiple authentication methods. This document defines the… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?