IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
In today’s world most organizations are moving from wireconnected LAN’s to wireless LAN’s. WLANs are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Wireless LANs require strict user authentication, data privacy and data integrity to prevent unauthorized access to network resources and protect data from modification or destruction. Many standard setting bodies are working on the problem of wireless security. Recently new protocols have been proposed by the Internet Engineering Task Force (IETF) for protecting client authentication by running the protocols in a secure tunnel wherein all data required for authenticating the user is well encrypted. The purpose of this thesis is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) on Microsoft Windows.
Authors and Affiliations
Anita Rana , Dr. Rajender Singh Chhillar
Enhanced Performance of Database by Automated Self-Tuned Systems
Performance tuning of Database Management Systems (DBMS) is complex as well as challenging task since it involves identification and alteration of several key performance tuning parameters. The quality of tuning and the...
[b][/b]An Analysis of ASRP Secure Routing Protocol for MANET
Mobile ad hoc networks (MANET) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participatin...
BLUETOOTH SECURITY–SECURE DATA TRANSFER OVER BLUETOOTH
This paper describes the mechanism of Bluetooth authentication. In Bluetooth When two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each...
A New Model Using Auction Oriented Approach in Grid Computing
Grids are emerging as the infrastructure for next generation computing. The resources in the Grid are heterogeneous and geographically distributed. The management of resources in such a large and distributed environment...
CLASSIFICATION PROBLEM IN DATA MINING - BY USING DECISION TREES
The aim of this paper is to present the classification problem in data mining using decision trees. Simply stated, data mining refers to extracting or “mining” knowledge from large amounts of data. Data mining known by d...