EAP-based Authentication with EAP Method Selection Mechanism
Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions t...
| Main Authors: | M.A.C., Bhakti, Azween, Abdullah, Low, Tan Jung |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/711/ http://scholars.utp.edu.my/id/eprint/711/1/ICIAS_2007_Final_%28PID498323%29.pdf |
Similar Items
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Autonomic, Self-Organizing Services-Oriented Architecture in Service Ecosystem
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Towards A Nature Inspired Self Organizing Service Oriented Architecture
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Nature-Inspired Self Organizing Service Oriented Architecture : A Proposal
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Towards an Autonomic Service Oriented Architecture in Computational Engineering Framework
by: M.A.C., Bhakti, et al.
by: M.A.C., Bhakti, et al.
Design of an Autonomic Services Oriented Architecture
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
EAP Listening Coursebooks: The Search for Authenticity
by: Holden, Simon
Published: (2017)
by: Holden, Simon
Published: (2017)
Towards self-organizing service oriented architecture
by: Azween, Abdullah, et al.
Published: (2009)
by: Azween, Abdullah, et al.
Published: (2009)
An Autonomic Service Oriented Architecture in Computational Engineering Framework
by: M. A. C., Bhakti, et al.
Published: (2010)
by: M. A. C., Bhakti, et al.
Published: (2010)
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Multi-Tiered Bio-Inspired Self-Healing Architectural
Paradigm for Software Systems
by: Azween, Abdullah, et al.
Published: (2009)
by: Azween, Abdullah, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Statistical Based Real-Time Selective Herbicide Weed Classifier
by: Ahmed, Irshad, et al.
Published: (2007)
by: Ahmed, Irshad, et al.
Published: (2007)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Towards self-organizing service oriented architecture
by: A., Abdullah, et al.
Published: (2009)
by: A., Abdullah, et al.
Published: (2009)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network
by: Asfandyar, khan, et al.
Published: (2008)
by: Asfandyar, khan, et al.
Published: (2008)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks
by: Muhammad , Imran, et al.
by: Muhammad , Imran, et al.
System login authentication using voice recognition and other AI methods / Zati Hakim Azizul Hasan
by: Zati Hakim, Azizul Hasan
Published: (2000)
by: Zati Hakim, Azizul Hasan
Published: (2000)
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
by: Hassan, Mahamat. I, et al.
Published: (2010)
by: Hassan, Mahamat. I, et al.
Published: (2010)
Dynamic Cluster Based Routing for Underwater
Wireless Sensor Networks
by: Muhammad, Ayaz, et al.
Published: (2010)
by: Muhammad, Ayaz, et al.
Published: (2010)
A Biologically Based Self-Healing Wireless Sensor Network
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Semantic-Based Scalable Decentralized Resource Discovery
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
Semantic-Based Grid Resource Discovery Systems
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak
by: Saqib Iqbal , Hakak
Published: (2018)
by: Saqib Iqbal , Hakak
Published: (2018)
Similar Items
-
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007) -
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008) -
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007) -
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010) -
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)