skip to main content
RFC2284: PPP Extensible Authentication Protocol (EAP)1998 RFC
Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.

RFC Downloads

Cited By

  1. ACM
    Boire S, Akgün T, Ginzboorg P, Laitinen P, Tamrakar S and Aura T Credential Provisioning and Device Configuration with EAP Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, (87-96)
  2. Ferrag M, Maglaras L, Argyriou A, Kosmanos D and Janicke H (2018). Security for 4G and 5G cellular networks, Journal of Network and Computer Applications, 101:C, (55-82), Online publication date: 1-Jan-2018.
  3. Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
  4. Shin S, Kobara K and Imai H (2008). A Secure Authenticated Key Exchange Protocol for Credential Services, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (139-149), Online publication date: 1-Jan-2008.
  5. López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
  6. ACM
    Ohba Y, Das S and Dutta A Kerberized handover keying Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-7)
  7. Akhlaq M, Aslam B, Khan M and Jafri M Comparative analysis of IEEE 802.1x authentication methods Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (1-6)
  8. ACM
    Bahl P, Chandra R, Padhye J, Ravindranath L, Singh M, Wolman A and Zill B Enhancing the security of corporate Wi-Fi networks using DAIR Proceedings of the 4th international conference on Mobile systems, applications and services, (1-14)
  9. Tham K, Looi M and Foo E Ubiquitous authorization scheme based on device profile Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (312-321)
  10. Shin S, Kobara K and Imai H An authentication and key exchange protocol for secure credential services Proceedings of the 9th international conference on Information Security, (443-458)
  11. Kim B and Hong S (2018). Secure Mutual Authentication for Ad hoc Wireless Networks, The Journal of Supercomputing, 33:1, (123-132), Online publication date: 1-Jul-2005.
  12. ACM
    Meyer U, Cordasco J and Wetzel S An approach to enhance inter-provider roaming through secret sharing and its application to WLANs Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (1-13)
  13. ACM
    Kassab M, Belghith A, Bonnin J and Sassi S Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, (46-53)
  14. ACM
    Ahmad A, Rizvi M and Olariu S Common data security network (CDSN) Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (1-7)
  15. Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
  16. Zhang H, Duan H, Liu W and Wu J An extensible AAA infrastructure for IPv6 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (482-487)
  17. Balfanz D, Durfee G, Grinter R, Smetters D and Stewart P Network-in-a-box Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (15-15)
  18. Eronen P and Arkko J Authentication components Proceedings of the 12th international conference on Security Protocols, (68-77)
  19. Park J and Dicoi D (2003). WLAN Security, IEEE Internet Computing, 7:5, (60-65), Online publication date: 1-Sep-2003.
  20. Lee J and Ryou J Strong user authentication in IEEE802.11 wireless LAN Proceedings of the 2nd international conference on Human.society@internet, (638-643)
  21. Koo S, Rosenberg C, Chan H and Lee Y Location-Based E-Campus Web Services Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  22. ACM
    Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
  23. ACM
    Zhang J, Li J, Weinstein S and Tu N (2002). Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support, ACM SIGMOBILE Mobile Computing and Communications Review, 6:3, (10-21), Online publication date: 1-Jun-2002.
  24. Nikander P Authorization and Charging in Public WLANs Using FreeBSD and 802.1x Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (109-119)
  25. ACM
    Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)
Contributors

Recommendations