Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,621 papers from all fields of science
Search
Sign In
Create Free Account
Protected Extensible Authentication Protocol
Known as:
PEAP
, Protected EAP
, EAP-MSCHAPv2
Expand
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Authentication protocol
Client-side
Comparison of mobile operating systems
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Implementasi Protected Extensible Authentication Protocol (PEAP) menggunakan Remote Access Dial In User Service (RADIUS)
Yosua John Muskitta
,
B. W. Yohanes
,
Hartanto Kusuma Wardana
2016
Corpus ID: 70205861
Perkembangan teknologi jaringan nirkabel memungkinkan kita melakukan komunikasi tanpa harus dibatasi oleh panjangnya kabel. Namun…
Expand
2012
2012
ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Amita Rana
,
R. S. Chhillar
2012
Corpus ID: 5997945
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of…
Expand
2010
2010
A practical analysis of EAP authentication methods
Alexandra Chiornita
,
L. Gheorghe
,
D. Rosner
9th RoEduNet IEEE International Conference
2010
Corpus ID: 9492804
In the context of a growing concern for data security, network access control has become an important part of every network…
Expand
2009
2009
Exception triggered DoS attacks on wireless networks
Yao Zhao
,
Sagar Vemuri
,
Jiazhen Chen
,
Yan Chen
,
H. Zhou
,
Zhi Fu
IEEE/IFIP International Conference on Dependable…
2009
Corpus ID: 444601
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on…
Expand
2008
2008
Policy Constraints facing Agricultural Development, Environmental Conservation and Poverty Reduction in East Africa
Y. Thomas
,
J. Mutua
,
J. Waithaka
,
R. Kaggwa
,
Catherine N. Mbaisi
2008
Corpus ID: 18907542
Agriculture is often cited as the key cause of habitat loss. This is because East African economies are principally agriculture…
Expand
2007
2007
Bootstrapping a Global SSO from Network Access Control Mechanisms
Manuel Sánchez
,
Gabriel López Millán
,
Óscar Cánovas Reverte
,
A. Gómez-Skarmeta
European Public Key Infrastructure Workshop
2007
Corpus ID: 19639942
This paper presents the details of a Single Sign On proposal which takes advantage of previously deployed authentication…
Expand
2005
2005
Using Secure Coprocessors to Protect Access to Enterprise Networks
Haidong Xia
,
J. Kanchana
,
J. Brustoloni
NETWORKING
2005
Corpus ID: 393928
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters…
Expand
2005
2005
DFID Policy Project: Participation of disabled people in the PRSP/PEAP process in Uganda
A. K. Dube
2005
Corpus ID: 155834793
2004
2004
Virtual prepaid tokens for Wi-Fi hotspot access
Haidong Xia
,
J. Brustoloni
29th Annual IEEE International Conference on…
2004
Corpus ID: 15653536
We introduce virtual prepaid tokens (VPT), a novel billing scheme that allows users to obtain access at Wi-Fi hotspots without…
Expand
1993
1993
Les potentiels évoqués somesthésiques (PESp) et auditifs (PEAp) précoces dans les comas anoxiques : valeur pronostique
M. Sonnet
,
D. Perrot
,
+4 authors
J. Motin
Neurophysiologie clinique
1993
Corpus ID: 53181072
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE