Skip Abstract Section
Abstract
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.
RFC Downloads
ZIP
Cited By
- Boire S, Akgün T, Ginzboorg P, Laitinen P, Tamrakar S and Aura T Credential Provisioning and Device Configuration with EAP Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, (87-96)
- Ferrag M, Maglaras L, Argyriou A, Kosmanos D and Janicke H (2018). Security for 4G and 5G cellular networks, Journal of Network and Computer Applications, 101:C, (55-82), Online publication date: 1-Jan-2018.
- Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
- Shin S, Kobara K and Imai H (2008). A Secure Authenticated Key Exchange Protocol for Credential Services, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (139-149), Online publication date: 1-Jan-2008.
- López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
- Ohba Y, Das S and Dutta A Kerberized handover keying Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-7)
- Akhlaq M, Aslam B, Khan M and Jafri M Comparative analysis of IEEE 802.1x authentication methods Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (1-6)
- Bahl P, Chandra R, Padhye J, Ravindranath L, Singh M, Wolman A and Zill B Enhancing the security of corporate Wi-Fi networks using DAIR Proceedings of the 4th international conference on Mobile systems, applications and services, (1-14)
- Tham K, Looi M and Foo E Ubiquitous authorization scheme based on device profile Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (312-321)
- Shin S, Kobara K and Imai H An authentication and key exchange protocol for secure credential services Proceedings of the 9th international conference on Information Security, (443-458)
- Kim B and Hong S (2018). Secure Mutual Authentication for Ad hoc Wireless Networks, The Journal of Supercomputing, 33:1, (123-132), Online publication date: 1-Jul-2005.
- Meyer U, Cordasco J and Wetzel S An approach to enhance inter-provider roaming through secret sharing and its application to WLANs Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (1-13)
- Kassab M, Belghith A, Bonnin J and Sassi S Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, (46-53)
- Ahmad A, Rizvi M and Olariu S Common data security network (CDSN) Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (1-7)
- Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
- Zhang H, Duan H, Liu W and Wu J An extensible AAA infrastructure for IPv6 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (482-487)
- Balfanz D, Durfee G, Grinter R, Smetters D and Stewart P Network-in-a-box Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (15-15)
- Eronen P and Arkko J Authentication components Proceedings of the 12th international conference on Security Protocols, (68-77)
- Park J and Dicoi D (2003). WLAN Security, IEEE Internet Computing, 7:5, (60-65), Online publication date: 1-Sep-2003.
- Lee J and Ryou J Strong user authentication in IEEE802.11 wireless LAN Proceedings of the 2nd international conference on Human.society@internet, (638-643)
- Koo S, Rosenberg C, Chan H and Lee Y Location-Based E-Campus Web Services Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
- Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
- Zhang J, Li J, Weinstein S and Tu N (2002). Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support, ACM SIGMOBILE Mobile Computing and Communications Review, 6:3, (10-21), Online publication date: 1-Jun-2002.
- Nikander P Authorization and Charging in Public WLANs Using FreeBSD and 802.1x Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (109-119)
- Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)