The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for EAP with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2004 (20) 2005-2006 (36) 2007 (35) 2008 (22) 2009 (21) 2010-2011 (30) 2012 (19) 2013-2014 (20) 2015-2016 (16) 2017-2019 (21) 2020-2021 (21) 2022-2023 (17) 2024 (4)
Publication types (Num. hits)
article(121) inproceedings(160) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 124 occurrences of 81 keywords

Results
Found 284 publication records. Showing 282 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Dan Harkins, Glen Zorn Extensible Authentication Protocol (EAP) Authentication Using Only a Password. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Pasi Eronen, Hannes Tschofenig, Yaron Sheffer An Extension for EAP-Only Authentication in IKEv2. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Katrin Hoeper, Madjid Nakhjiri, Yoshihiro Ohba Distribution of EAP-Based Keys for Handover and Re-Authentication. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa An EAP-EHash authentication method adapted to resource constrained terminals. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Syed Faraz Hasan, Nazmul H. Siddique, Shyam S. Chakraborty On evaluating the latency in handing over to EAP-enabled WLAN APs from outdoors. Search on Bibsonomy CSNDSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Shen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks. Search on Bibsonomy BWCCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Jian Cheng 0002, Aurobrata Ghosh, Tianzi Jiang, Rachid Deriche Model-Free and Analytical EAP Reconstruction via Spherical Polar Fourier Diffusion MRI. Search on Bibsonomy MICCAI (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Yuh-Min Tseng USIM-based EAP-TLS authentication protocol for wireless local area networks. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Christoforos Ntantogian, Christos Xenakis One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Konstantinos E. Drakakis, Athanasios D. Panagopoulos, Panayotis G. Cottis Overview of satellite communication networks security: introduction of EAP. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jari Arkko, Vesa Lehtovirta, Pasi Eronen Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA'). Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Nancy Cam-Winget, David A. McGrew, Joseph Salowey, Hao Zhou Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20T. Charles Clancy, Hannes Tschofenig Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method. Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Nancy Cam-Winget, Hao Zhou Basic Password Exchange within the Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST). Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Li Wang 0039, Mei Song, Junde Song A Dynamic Periodic Distributing Scheme for Authentication data based on EAP-AKA in Heterogeneous Interworking Networks. Search on Bibsonomy VTC Fall The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Hyeran Mun, Kyusuk Han, Kwangjo Kim 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. Search on Bibsonomy WTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Prashant Pillai, Yim-Fun Hu Performance Analysis of EAP Methods Used as GDOI Phase 1 for IP Multicast on Airplanes. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Martin Rost User-Centric-Workflow für den EAP - Das etwas andere Modell vom Einheitlichen Ansprechpartner. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Hannes Tschofenig, Dirk Kröselberg, Andreas Pashalidis, Yoshihiro Ohba, Florent Bersani The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Paul Funk, Simon Blake-Wilson Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0). Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Bernard Aboba, Dan Simon, Pasi Eronen Extensible Authentication Protocol (EAP) Key Management Framework. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Dan Simon, Bernard Aboba, Ryan Hurst The EAP-TLS Authentication Protocol. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Carolin Latze, Ulrich Ultes-Nitsche A Proof-of-Concept Implementation of EAP-TLS with TPM Support. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
20Chirag Parikh, Parimal Patel Selection and Implementation of an EAP Authentication Protocol for Hand-held Devices. Search on Bibsonomy CAINE The full citation details ... 2008 DBLP  BibTeX  RDF
20Qing Xu, Changsheng Wan, Aiqun Hu The Performance Analysis of Fast EAP Re-authentication Protocol. Search on Bibsonomy ISCSCT (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ram Dantu, Gabriel Clothier, Anuj Atri EAP methods for wireless networks. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Rena Helms-Park, Pavlina Radia, Paul Stapleton A preliminary assessment of Google Scholar as a source of EAP students' research materials. Search on Bibsonomy Internet High. Educ. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Nancy Cam-Winget, David A. McGrew, Joseph Salowey, Hao Zhou The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST). Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Khidir M. Ali, Thomas J. Owens Selection of an EAP authentication method for a WLAN. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Madjid Nakhjiri Use of EAP-AKA, IETF Hokey and AAA Mechanisms to Provide Access and Handover Security and 3G-802.16M Interworking. Search on Bibsonomy PIMRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Rafa Marin, Pedro García López, Antonio Fernandez Gómez-Skarmeta Cryptographic identity based solution for fast handover on EAP wireless networks. Search on Bibsonomy MWCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Rafael Marín López, Pedro J. Fernández, Antonio Fernandez Gómez-Skarmeta 3-Party Approach for Fast Handover in EAP-Based Wireless Networks. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, key distribution, Fast handover
20Mohamad Badra, Pascal Urien Adding Identity Protection to EAP-TLS Smartcards. Search on Bibsonomy WCNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ritsu Nomura, Masahiro Kuroda, Tadanori Mizuno Evaluation of EAP based Re-authentication Protocol for High-speedVehicular Handover in Cognitive Radio Networks. Search on Bibsonomy CrownCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Katrin Hoeper, Lidong Chen Where EAP security claims fail. Search on Bibsonomy QSHINE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Rafael Marín López, Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, authentication, Fast handover, network access control
20Andrea Manganaro, Mingyur Koblensky, Michele Loreti Design of a Password-Based EAP Method. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Farid Adrangi, Victor Lortz, Farooq Bari, Pasi Eronen Identity Selection Hints for the Extensible Authentication Protocol (EAP). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jari Arkko, Henry Haverinen Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20T. Charles Clancy, William A. Arbaugh Extensible Authentication Protocol (EAP) Password Authenticated Exchange. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Henry Haverinen, Joseph Salowey Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Michaela C. Vanderveen, Hesham Soliman Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Pascal Urien, Mesmin Dandjinou, Mohamad Badra Introducing trusted EAP module for security enhancement in WLANs and VPNs. Search on Bibsonomy Communication, Network, and Information Security The full citation details ... 2006 DBLP  BibTeX  RDF
20Pascal Urien, Mohamad Badra Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. Search on Bibsonomy SECRYPT The full citation details ... 2006 DBLP  BibTeX  RDF
20Jared Cordasco, Ulrike Meyer, Susanne Wetzel Implementation and Performance Evaluation of EAP-TLS-KS. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jyh-Cheng Chen, Yu-Ping Wang Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Pasi Eronen, Tom Hiller, Glen Zorn Diameter Extensible Authentication Protocol (EAP) Application. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Dorothy Stanley, Jesse Walker, Bernard Aboba Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20John R. Vollbrecht, Pasi Eronen, Nick L. Petroni Jr., Yoshihiro Ohba State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Yoseph Bar-Cohen Bionic Humans Using EAP as Artificial Muscles Reality and Challenges Search on Bibsonomy CoRR The full citation details ... 2004 DBLP  BibTeX  RDF
20Bernard Aboba, Larry J. Blunk, John R. Vollbrecht, James Carlson, Henrik Levkowetz Extensible Authentication Protocol (EAP). Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Mohamad Badra, Pascal Urien Enhancing WLAN Security by Introducing EAP-TLS Smartcards. Search on Bibsonomy ICWI The full citation details ... 2004 DBLP  BibTeX  RDF
20Bernard Aboba, Pat R. Calhoun RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP). Search on Bibsonomy RFC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Marc Loutrel, Pascal Urien, Dominique Gaïti An EAP-BT smartcard for authentication in the next generation of wireless communications. Search on Bibsonomy Net-Con The full citation details ... 2002 DBLP  BibTeX  RDF
20Bernard Aboba, Dan Simon PPP EAP TLS Authentication Protocol. Search on Bibsonomy RFC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Larry J. Blunk, John R. Vollbrecht PPP Extensible Authentication Protocol (EAP). Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Xiao Zheng, Behçet Sarikaya Handover keying and its uses. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 Novel Protocol and Its Implementation QKD in Wi-Fi Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Levente Buttyán, László Dóra An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Rainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior Mobile WiMAX Network Security. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Marc Barisch Modelling the impact of virtual identities on communication infrastructures. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aaa performance, authentication load, identity management, virtual identities
16Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan Link-layer protection in 802.11i WLANS with dummy authentication. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dummy authentication, security, wlan, open access
16Norihiro Kamamichi, Toshiharu Maeba, Masaki Yamakita, Toshiharu Mukai Fabrication of bucky gel actuator/sensor devices based on printing method. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Cecilia Laschi, Barbara Mazzolai, Virgilio Mattoli, Matteo Cianchetti, Paolo Dario Design and Development of a Soft Actuator for a Robot Inspired by the Octopus Arm. Search on Bibsonomy ISER The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Joaquín Torres Márquez, Antonio Izquierdo, Mildrey Carbonell, José María Sierra Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network smart cards, authentication and authorization architectures, WLAN/3G interworking, secure protocols
16Brahim Gaabab, David Binet, Jean-Marie Bonnin Authentication Optimization for Seamless Handovers. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Taeshik Shon, Wook Choi An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Norihiro Kamamichi, Masaki Yamakita, Kinji Asaka, Zhi Wei Luo, Toshiharu Mukai Experimental verifications on control and sensing of bucky gel actuator/sensor. Search on Bibsonomy IROS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Muhammad Sher, Thomas Magedanz 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16A. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi An ICT Technical Reference Model for Iran Universities. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Deng-Jyi Chen, Ah-Fur Lai, Chia-Chi Mao The Analysis of Response Patterns on IRT Ability Estimation Methods in Computerized Adaptive Test. Search on Bibsonomy ICALT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mart Anton, Maarja Kruusmaa, Alvo Aabloo, Andres Punning Validating Usability of Ionomeric Polymer-Metal Composite Actuators for Real World Applications. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Sibaram Khara, Iti Saha Misra, Debashis Saha An Alternative Architecture for WLAN/GPRS Integration. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ralf Wienzek, Rajendra Persaud Fast Re-authentication for Handovers in Wireless Communication Networks. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Wireless Networks, Authentication, Handover
16Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Binod Vaidya, YoungJin Kim, Eung-Kon Kim, Seung Jo Han Investigating Authentication Mechanisms for Wireless Mobile Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Bill Pontikakis, François R. Boyer, Yvon Savaria A 0.8V algorithmically defined buffer and ring oscillator low-energy design for nanometer SoCs. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Tarun Joshi, Anindo Mukherjee, Dharma P. Agrawal Exploiting Mobility Patterns to Reduce Re-Authentication Overheads in Infrastructure WLAN Networks. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol composition logic, TLS, IEEE 802.11i
16HyunGon Kim, ByeongKyun Oh Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF prepaid, authorization, Mobile IPv6, Mobile node
16Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males A Kerberos-Based Authentication Architecture for Wireless LANs. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Byung Gil Lee, Hyun Gon Kim, Sung Won Sohn, Kil-Houm Park Design of an Accounting Architecture for Load and Session Managed Diameter-Based AAA Network. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #282 of 282 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license