نتایج جستجو برای: eap documents
تعداد نتایج: 71466 فیلتر نتایج به سال:
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). Haverinen Expires in six months [Page 1] Internet Draft EAP SIM Authentication November 2001
Objectives. Our previous study has used RNA-seq technology to show that apoptotic molecules were involved in the myocardial protection of electroacupuncture pretreatment (EAP) on the ischemia/reperfusion (I/R) animal model. Therefore, this study was designed to investigate how EAP protects myocardium against myocardial I/R injury through antiapoptotic mechanism. Methods. By using rats with myoc...
The Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentica...
Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...
The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...
Remote EAP-SIM authentication has an overwhelming impact on the authentication delay. RADIUS protocol can be used for local authentication which reduces authentication latency. However, in case of EAP-SIM authentication, where triplets are to be retrieved from a remote authentication gateway (AuC), this does not help much. An Improved EAP-SIM authentication method was proposed in [2]. In this p...
Extensible Authentication Protocol (EAP) Password Authenticated Exchange Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines an Extensible Authentication Protocol (EAP) method called EAP-PAX (Password Authenticated eXchange). This method is a li...
english for academic purposes (eap) is a significant part of the curriculum in iranian universities. however, it seems that eap programs have been developed without a systematic needs analysis. the purpose of this study was assessing the present and target situation needs of two groups of undergraduates of computer science. a total of 320 students and 44 instructors participated in this triangu...
UNLABELLED Cochlear implantation has been recommended for children under 24 months of age. The use of objective measures is needed to help speech processor programming. The electrically evoked compound potential (EAP), which can be assessed by neural response telemetry (NRT), is one of those objective measures. AIM to determine how often the EAP can be recorded by NRT system during surgery an...
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید