Skip to search formSkip to main contentSkip to account menu

Protected Extensible Authentication Protocol

Known as: PEAP, Protected EAP, EAP-MSCHAPv2 
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Perkembangan teknologi jaringan nirkabel memungkinkan kita melakukan komunikasi tanpa harus dibatasi oleh panjangnya kabel. Namun… 
2012
2012
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of… 
2010
2010
In the context of a growing concern for data security, network access control has become an important part of every network… 
2008
2008
Agriculture is often cited as the key cause of habitat loss. This is because East African economies are principally agriculture… 
2008
2008
Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an… 
2007
2007
This paper presents the details of a Single Sign On proposal which takes advantage of previously deployed authentication… 
2005
2005
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters… 
2004
2004
We introduce virtual prepaid tokens (VPT), a novel billing scheme that allows users to obtain access at Wi-Fi hotspots without…