IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
In today’s world most organizations are moving from wireconnected LAN’s to wireless LAN’s. WLANs are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Wireless LANs require strict user authentication, data privacy and data integrity to prevent unauthorized access to network resources and protect data from modification or destruction. Many standard setting bodies are working on the problem of wireless security. Recently new protocols have been proposed by the Internet Engineering Task Force (IETF) for protecting client authentication by running the protocols in a secure tunnel wherein all data required for authenticating the user is well encrypted. The purpose of this thesis is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) on Microsoft Windows.
Authors and Affiliations
Anita Rana , Dr. Rajender Singh Chhillar
An Analytical Research on Foreign Institutional Investment in India
Foreign institutional investors have gained a significant role in Indian stock markets. The increase in the volume of foreign institutional investment (FII) inflows in recent years has led to concerns regarding the vola...
IMPACT OF SOFT-ERROR IN ROBUST CONFIGURABLE SYSTEM DESIGN USING REAL TIME OPERATING SYSTEM
This paper investigates the sensitivity of real-time systems running applications under operating systems that are subject to soft-errors. A procedure for characterizing the soft error susceptibility of nodes in a logic...
Enhanced Performance of Database by Automated Self-Tuned Systems
Performance tuning of Database Management Systems (DBMS) is complex as well as challenging task since it involves identification and alteration of several key performance tuning parameters. The quality of tuning and the...
FAST AND REACTIVE HANDOFF OVER HETROGENOUS NETWORK
In the last decade several wired and wireless network have made immense contribution for giving global information access to diverse users. The next generation communication aims at integration of different networks. The...
GRID COMPUTING AND CHECKPOINT APPROACH
Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a distributed computing paradigm that differs from traditiona...