Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,408,116 papers from all fields of science
Search
Sign In
Create Free Account
Protected Extensible Authentication Protocol
Known as:
PEAP
, Protected EAP
, EAP-MSCHAPv2
Expand
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Authentication protocol
Client-side
Comparison of mobile operating systems
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
OS EFEITOS PROCESSUAIS DO PER E DO PEAP NAS ACÇÕES DECLARATIVAS DE CONDENAÇÃO
Nuno Salazar Casanova
2018
Corpus ID: 159438503
portuguesO Processo Especial de Revitalizacao e o Processo Especial para Acordo de Pagamento impedem os credores de instaurar…
Expand
2014
2014
TNFα-induced endothelial activation is counteracted by polyphenol extract from UV-stressed cyanobacterium Arthrospira platensis
P. Ferrari
,
D. Palmieri
,
A. Casazza
,
B. Aliakbarian
,
P. Perego
,
D. Palombo
Medicinal Chemistry Research
2014
Corpus ID: 253636897
The cyanobacterium Arthrospira platensis has been considered as a potential source of several therapeutic compounds including…
Expand
2012
2012
ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Amita Rana
,
R. S. Chhillar
2012
Corpus ID: 5997945
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of…
Expand
2009
2009
Extensible Authentication Protocol: Authentication, Wireless LAN, Point-to-Point Protocol, Wi-Fi Protected Access, Internet Engineering Task Force, EAP-SIM, ... Protected Extensible Authentication…
Frederic P. Miller
,
Agnes F. Vandome
,
John McBrewster
2009
Corpus ID: 64013177
Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and…
Expand
2008
2008
Authentication in Wireless Networks
Divya Bansal
,
Sachin Lalar
2008
Corpus ID: 7730617
Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an…
Expand
2007
2007
CHALLENGES OF RETAINING HEALTH WORKERS IN THE PNFP SECTOR: THE CASE OF UGANDA CATHOLIC HEALTH NETWORK
S. Orochi
2007
Corpus ID: 56314722
Shortage of human resource for health poses a major challenge to achieving the millennium development goals. Uganda is among the…
Expand
2005
2005
Smart PSK provisioning: a key-management and authentication scheme for wireless LANs
Dario S. Tonesi
,
L. Salgarelli
Proceedings. 14th International Conference on…
2005
Corpus ID: 15129106
The majority of the authentication methods used in modern wireless local area networks (WLANs) are inherited from protocols…
Expand
2005
2005
Analysis and Performance Evaluation of Wireless LAN Handover
M. S. Iacobucci
,
G. Paris
,
Dante Simboli
,
Gabriella Zitti
International Symposium on Wireless Communication…
2005
Corpus ID: 11764255
Wireless LAN (WLAN) is a wireless network which provides connectivity in a limited area; IEEE 802.11 is the most widespread…
Expand
2005
2005
Setting the scene: the Ugandan Poverty Eradication Action Plan
Moses Isooba
,
R. Ssewakiryanga
2005
Corpus ID: 167082158
39 participatorylearningandaction 51April2005 Introduction The need for developing a poverty eradication plan in Uganda grew out…
Expand
1989
1989
Monitorización a cadencia elevada de los potenciales evocados auditivos precoces (PEAP): su aportación al estudio de la función troncoencefálica durante el coma
Luis Larrea
1989
Corpus ID: 141173108
Presentamos los principios metodologia y resultados de la monitorizacion continua de la funcion del tronco cerebral por medio de…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE