Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,788,175 papers from all fields of science
Search
Sign In
Create Free Account
Protected Extensible Authentication Protocol
Known as:
PEAP
, Protected EAP
, EAP-MSCHAPv2
Expand
The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Authentication protocol
Client-side
Comparison of mobile operating systems
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Implementasi Protected Extensible Authentication Protocol (PEAP) menggunakan Remote Access Dial In User Service (RADIUS)
Yosua John Muskitta
,
B. W. Yohanes
,
Hartanto Kusuma Wardana
2016
Corpus ID: 70205861
Perkembangan teknologi jaringan nirkabel memungkinkan kita melakukan komunikasi tanpa harus dibatasi oleh panjangnya kabel. Namun…
Expand
2014
2014
TNFα-induced endothelial activation is counteracted by polyphenol extract from UV-stressed cyanobacterium Arthrospira platensis
P. Ferrari
,
D. Palmieri
,
A. Casazza
,
B. Aliakbarian
,
P. Perego
,
D. Palombo
Medicinal Chemistry Research
2014
Corpus ID: 253636897
The cyanobacterium Arthrospira platensis has been considered as a potential source of several therapeutic compounds including…
Expand
2012
2012
ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Amita Rana
,
R. S. Chhillar
2012
Corpus ID: 5997945
The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of…
Expand
2008
2008
Authentication in Wireless Networks
Divya Bansal
,
Sachin Lalar
2008
Corpus ID: 7730617
Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an…
Expand
2007
2007
Bootstrapping a Global SSO from Network Access Control Mechanisms
Manuel Sánchez
,
Gabriel López Millán
,
Óscar Cánovas Reverte
,
A. Gómez-Skarmeta
European Public Key Infrastructure Workshop
2007
Corpus ID: 19639942
This paper presents the details of a Single Sign On proposal which takes advantage of previously deployed authentication…
Expand
2005
2005
Smart PSK provisioning: a key-management and authentication scheme for wireless LANs
Dario S. Tonesi
,
L. Salgarelli
Proceedings. 14th International Conference on…
2005
Corpus ID: 15129106
The majority of the authentication methods used in modern wireless local area networks (WLANs) are inherited from protocols…
Expand
2005
2005
Analysis and Performance Evaluation of Wireless LAN Handover
M. S. Iacobucci
,
G. Paris
,
Dante Simboli
,
Gabriella Zitti
International Symposium on Wireless Communication…
2005
Corpus ID: 11764255
Wireless LAN (WLAN) is a wireless network which provides connectivity in a limited area; IEEE 802.11 is the most widespread…
Expand
2005
2005
DFID Policy Project: Participation of disabled people in the PRSP/PEAP process in Uganda
A. K. Dube
2005
Corpus ID: 155834793
2005
2005
Using Secure Coprocessors to Protect Access to Enterprise Networks
Haidong Xia
,
J. Kanchana
,
J. Brustoloni
NETWORKING
2005
Corpus ID: 393928
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters…
Expand
2005
2005
Setting the scene: the Ugandan Poverty Eradication Action Plan
Moses Isooba
,
R. Ssewakiryanga
2005
Corpus ID: 167082158
39 participatorylearningandaction 51April2005 Introduction The need for developing a poverty eradication plan in Uganda grew out…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE