Please use this identifier to cite or link to this item: https://ptsldigital.ukm.my/jspui/handle/123456789/395089
Full metadata record
DC FieldValueLanguage
dc.contributor.authorM. Agni Catur Bhakti-
dc.contributor.authorAzween Abdullah-
dc.contributor.authorLow Tan Jung-
dc.date.accessioned2023-06-15T07:54:56Z-
dc.date.available2023-06-15T07:54:56Z-
dc.identifier.otherukmvital:122947-
dc.identifier.urihttps://ptsldigital.ukm.my/jspui/handle/123456789/395089-
dc.description.abstractAuthentication is an important aspect in network security, especially in wireless network where unauthorized user can gain access to the network without any physical access. One of the authentication protocols that have been used in wireless networks is the Extensible Authentication Protocol (EAP). This paper discusses the simulation development and simulation results of a mechanism to select and negotiate the suitable EAP method to be used in EAP authentication between two nodes.-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE),Piscataway, US-
dc.subjectEAP method-
dc.subjectNegotiation mechanism-
dc.titleSimulation of EAP method selection and negotiation mechanism-
dc.typeSeminar Papers-
dc.format.pages5-
dc.identifier.callnoT58.5.C634 2008 kat sem j.3-
dc.contributor.conferencenameInternational Symposium on Information Technology-
dc.coverage.conferencelocationKuala Lumpur Convention Centre-
dc.date.conferencedate26/08/2008-
Appears in Collections:Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.