IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
In today’s world most organizations are moving from wireconnected LAN’s to wireless LAN’s. WLANs are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Wireless LANs require strict user authentication, data privacy and data integrity to prevent unauthorized access to network resources and protect data from modification or destruction. Many standard setting bodies are working on the problem of wireless security. Recently new protocols have been proposed by the Internet Engineering Task Force (IETF) for protecting client authentication by running the protocols in a secure tunnel wherein all data required for authenticating the user is well encrypted. The purpose of this thesis is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) on Microsoft Windows.
Authors and Affiliations
Anita Rana , Dr. Rajender Singh Chhillar
Measurement Quality of Software Modules during Reengineering by Using Pattern Based Quality Model
The purpose of this paper is to determining the quality of software modules during reengineering of object oriented system.
Impact of Foreign Direct Investment on Retail Sector in India
The retail industry in India is expected to grow at a rate of 14% by financial year 2013-2014.
“SAFE & SECURE DATA COMMUNICATION IN MOBILE ADHOC NETWORK - BY USING IPSEC PROTOCOL”
Ad-hoc networks are a new paradigm in wireless communication due to its high significance in various sensitive and emergency operations. An Ad-hoc Network is a multi hop wireless network. Typically network nodes are inte...
Human Computer Interaction: An intellectual approach
This paper discusses the research that has been done in the field of Human Computer Interaction (HCI) relating to human psychology. Human-computer interaction (HCI) is the study of how people design, implement, and use i...
CAC Schemes for Capacity Enhancement in WCDMA Systems
To support multiple Service class of different data transmission rate for multimedia application in wireless systems. WCDMA involves orthogonal variable spreading factor (OVSF) code technique. Call admission control (CAC...