Moderate EAP-TLS Protocol - A New Approche

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Working Group Eap-tls Authentication Protocol

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

متن کامل

Status of this Memo PPP EAP TLS Authentication Protocol

PPP EAP TLS Authentication Protocol Status of this Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. 1. Abstract The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams ove...

متن کامل

Performance Analysis of Signaling Cost on EAP-TLS Authentication Protocol based on Cryptography

With the wide applications of wireless communication in the air inter-face, needs secure connections, efficient decryption and strong authentication mechanisms. In general,authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Reducing the processing time spent on authentication procedure is very important for ...

متن کامل

Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography

With the wide applications of wireless communication in the air interface , needs secure connections, efficient decryption and strong authentication mechanisms. In

متن کامل

Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters

We investigate how to safely export additional cryptographic keys from secure channel protocols, modelled with the authenticated and confidential channel establishment (ACCE) security notion. For example, the EAP-TLS protocol uses the Transport Layer Security (TLS) handshake to output an additional shared secret which can be used for purposes outside of TLS, and the RFC 5705 standard specifies ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2012

ISSN: 2636-4441

DOI: 10.21608/iceeng.2012.32803