UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2
hits: 11
1.
  • A Secure Authentication Pro... A Secure Authentication Protocol for IoT-WLAN using EAP framework
    Yadav, Awaneesh Kumar; Misra, Manoj; Pandey, Pradumn Kumar ... IEEE transactions on dependable and secure computing, 2024
    Journal Article

    The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks ...
Full text
2.
  • An EAP-Based Mutual Authent... An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
    Yadav, Awaneesh Kumar; Misra, Manoj; Pandey, Pradumn Kumar ... IEEE transactions on industrial informatics, 02/2023, Volume: 19, Issue: 2
    Journal Article
    Open access

    Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are ...
Full text
3.
  • Multihop Bootstrapping With... Multihop Bootstrapping With EAP Through CoAP Intermediaries for IoT
    Garcia-Carrillo, Dan; Marin-Lopez, Rafael IEEE internet of things journal, 10/2018, Volume: 5, Issue: 5
    Journal Article

    In the renowned Internet of Things (IoT) networks, it is expected a vast number of devices with IP connectivity and constrained capabilities. Due to reduced resources they are the target of different ...
Full text
4.
  • Complete EAP Method: User E... Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs
    Fan, Chun-I; Lin, Yi-Hui; Hsu, Ruei-Hau IEEE transactions on parallel and distributed systems, 04/2013, Volume: 24, Issue: 4
    Journal Article
    Peer reviewed

    It is necessary to authenticate users who attempt to access resources in Wireless Local Area Networks (WLANs). Extensible Authentication Protocol (EAP) is an authentication framework widely used in ...
Full text
5.
  • Reduced Overhead Frequent U... Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks
    Raja, Gunasekaran; Mary Baskaran, Sheeba Backia; Ghosal, Dipak ... Mobile networks and applications, 06/2016, Volume: 21, Issue: 3
    Journal Article
    Peer reviewed

    The authentication mechanisms in Broadband Wireless Networks (BWN) are predominantly based on Extensible Authentication Protocol (EAP). However, the complexity of EAP causes an impediment in BWN ...
Full text
6.
  • A self-adaptive K selection... A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems
    Fanyang; Xiong, Naixue; Park, Jong Hyuk The Journal of supercomputing, 07/2012, Volume: 61, Issue: 1
    Journal Article
    Peer reviewed

    Since the 802.16e standard has been released, there are few authentication pattern schemes and Extensible Authentication Protocol (EAP) selection proposals for manufacturers to choose from in ...
Full text
7.
  • Multicast receiver access c... Multicast receiver access control by IGMP-AC
    Islam, Salekul; Atwood, J. William Computer networks (Amsterdam, Netherlands : 1999), 05/2009, Volume: 53, Issue: 7
    Journal Article
    Peer reviewed

    IP multicast is best-known for its bandwidth conservation and lower resource utilization. The present service model of multicast makes it difficult to restrict access to authorized End Users (EUs) or ...
Full text
8.
Full text

PDF
9.
  • 802.1x Mechanism 802.1x Mechanism
    Perez, André Network Security, 2014, 2014-10-02
    Book Chapter

    The 802.1x access control mechanism is deployed in the Local Area Network (LAN) implementing the following technologies: Ethernet technology and Wireless‐Fidelity (Wi‐Fi). The Extensible ...
Full text
10.
  • Network Security Network Security
    Designing and Developing Scalable IP Networks, 07/2004
    Book Chapter

    This chapter contains sections titled: Securing Access to Your Network Devices Securing Access to the Network Infrastructure Protecting Your Own and Others' Network Devices
Full text
1 2
hits: 11

Load filters