Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/395089
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | M. Agni Catur Bhakti | - |
dc.contributor.author | Azween Abdullah | - |
dc.contributor.author | Low Tan Jung | - |
dc.date.accessioned | 2023-06-15T07:54:56Z | - |
dc.date.available | 2023-06-15T07:54:56Z | - |
dc.identifier.other | ukmvital:122947 | - |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/395089 | - |
dc.description.abstract | Authentication is an important aspect in network security, especially in wireless network where unauthorized user can gain access to the network without any physical access. One of the authentication protocols that have been used in wireless networks is the Extensible Authentication Protocol (EAP). This paper discusses the simulation development and simulation results of a mechanism to select and negotiate the suitable EAP method to be used in EAP authentication between two nodes. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US | - |
dc.subject | EAP method | - |
dc.subject | Negotiation mechanism | - |
dc.title | Simulation of EAP method selection and negotiation mechanism | - |
dc.type | Seminar Papers | - |
dc.format.pages | 5 | - |
dc.identifier.callno | T58.5.C634 2008 kat sem j.3 | - |
dc.contributor.conferencename | International Symposium on Information Technology | - |
dc.coverage.conferencelocation | Kuala Lumpur Convention Centre | - |
dc.date.conferencedate | 26/08/2008 | - |
Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.