Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the security of the subsequent session credentials are based only on keys derived during the unilateral authentication where the network server is authenticated to the client. Client authentication is mentioned as an option in PEAP and EAP-TTLS, but is not mandated. Naturally, the PIC protocol does not even offer this option, because the goal of PIC is to...
A password-authenticated key exchange scheme allows two entities, who only share a memorable passwor...
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility w...
We define in the context of this work a new EAP method, that we call EAP-CGA. This method performs a...
Recently new protocols have been proposed in IETF for protecting remote client authentication protoo...
This memo provides information for the Internet community. It does not specify an Internet standard ...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Abstract. The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP...
Tunnel Extensible Authentication Protocol (TEAP) Version 1 This document defines the Tunnel Extensib...
Remote authentication of users supported by passwords is a broadly adopted method of authentication ...
In practice, users will rely on a wide variety of communication protocols to conduct their work over...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
[[abstract]]Deniable authentication, which was introduced to realize secure online negotiation, has ...
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In...
A password-authenticated key exchange scheme allows two entities, who only share a memorable passwor...
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility w...
We define in the context of this work a new EAP method, that we call EAP-CGA. This method performs a...
Recently new protocols have been proposed in IETF for protecting remote client authentication protoo...
This memo provides information for the Internet community. It does not specify an Internet standard ...
Session initiation protocol (SIP) is the most widely used application layer control protocol for cre...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Abstract. The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP...
Tunnel Extensible Authentication Protocol (TEAP) Version 1 This document defines the Tunnel Extensib...
Remote authentication of users supported by passwords is a broadly adopted method of authentication ...
In practice, users will rely on a wide variety of communication protocols to conduct their work over...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
[[abstract]]Deniable authentication, which was introduced to realize secure online negotiation, has ...
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In...
A password-authenticated key exchange scheme allows two entities, who only share a memorable passwor...
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility w...
We define in the context of this work a new EAP method, that we call EAP-CGA. This method performs a...