Книга: Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru «Evaluation of EAP Authentication Methods»

Evaluation of EAP Authentication Methods

Производитель: "LAP Lambert Academic Publishing"

In any networking environment, security, connection time and scalability of the network are the major concerns to keep network safe, faster and stable. Administrators working within the networking environment need to have complete account of manageability, scalability and security of the network, so that the organizational data can be kept confidential and maintain integrity. There are different authentication methods used by network administrators for accessing network in wired and wireless environments. As network usage and attacks on network increases, a secure, scalable and standard network protocol is needed for accessing and to keep data safe in both wired and wireless networks. IEEE 802. 1x is an IEEE standard used to provide authentication and authorization to the devices over LAN/WLAN. The framework IEEE 802. 1x uses EAP for authentication and authorization with a RADIUS server. In this report, an experimental analysis for different EAP authentication methods in both... ISBN:9783659490354

Издательство: "LAP Lambert Academic Publishing" (2013)

ISBN: 9783659490354

См. также в других словарях:

  • Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… …   Wikipedia

  • Windows 2000 — Part of the Microsoft Windows family Screenshot of Windows 2000 Professional …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»