An agent-based architecture for fast context transfers during handoffs
International Journal of Ad Hoc and Ubiquitous Computing
On RSN-oriented wireless intrusion detection
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
On the Use of Ad Hoc Cooperation for Seamless Vertical Handoff and Its Performance Evaluation
Mobile Networks and Applications
Adaptation of IEEE 802.1x for secure session establishment between ethernet peers
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Formal verification of the Extensible Authentication Protocol using SPIN
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.25 |
This article presents the technical details of the Extensible Authentication Protocol (EAP) and IEEE 802.1x by using WIRE1x, an open-source implementation of IEEE 802.1x client (supplicant) and various EAP-based authentication mechanisms. By using a real implementation, 802.1x and EAP should be easily understood.