Essays about: "IEEE 802.1X"

Showing result 6 - 10 of 13 essays containing the words IEEE 802.1X.

  1. 6. Evaluation of EAP-methods

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Peter Lorentzen; Johan Lindh; [2010]
    Keywords : 802.1x; authentication; EAP-methods; RADIUS; network;

    Abstract : Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802. READ MORE

  2. 7. A New Authenticator

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Jia Guo; [2010]
    Keywords : ;

    Abstract : This thesis is part of a larger project on non-binary alternatives to authentication; in contrast to the binary authentication used in IEEE 802.1X and IEEE 802.11i. This thesis project seeks to define, implement, and evaluate a non-binary wireless access authentication mechanism. READ MORE

  3. 8. WLAN Security : WLAN Security

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Abdul Qudoos Memon; Ali Hasan Raza; Sadia Iqbal Iqbal; [2010]
    Keywords : ;

    Abstract : WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN. READ MORE

  4. 9. Network Admission Control (NAC)Securing end point devices

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Adewale Yusuf; Jerry Lartey; Vilhelm Wareus; [2010]
    Keywords : IEEE 802.1X;

    Abstract : There have been remarkable growths in wireless communication networks in recent years; this is because of its merits over the wired networks such as Mobility and convenience. Wireless networks transmit the signal over the open air via radio waves of different frequencies, this makes it to be vulnerable to several attacks and anybody on the street can easily intercept the wireless data or inject new data into the entire network. READ MORE

  5. 10. Non-binary Authentication : Supplicant

    University essay from KTH/Kommunikationssystem, CoS

    Author : Hengchong Zhang; [2009]
    Keywords : Supplicant; authentication; IEEE 802.1x; non-binary; Supplikant; autentisering; IEEE 802.1x; icke-binära autentisering;

    Abstract : There are a number of authentication methods for wireless local area networks. The IEEE 802.1x standard is one such method. This standard specifies a port-based access control protocol. READ MORE