Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
This paper presents IEEE 802.11 implementation specific issues that may contribute to poor WLAN authentication and access control security performance in a public WLAN. It will also analyse five EAP methods and present a proposed implementation environment based approach for selection of an Extensible Authentication protocol (EAP) method for a Public WLAN authentication.
Authors and Affiliations
David Gitonga Mwathi, William Okello-Odongo, Elisha Opiyo
Web Mining — Concepts and its Applications
Recover information from World Wide Web is a boring assignment since the expansion in the ease of use of knowledge backup supply on it. So this raises the need to utilize a clever system to recover the information from W...
CLUSTERING ALGORITHMS AND THEIR APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT
Cloud computing is Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. Cloud computing is the hottest purpose built architecture created to suppo...
ARABIC Cryptography Technique Using Neural Network and Genetic Algorithm
Cryptography is the science of Encrypting / Decryption information. The goals of cryptography is to keep message confidentiality, message integrity and sender authentication. The techniques used to encrypt information in...
Parameter Adjustment of Pulse Coupled Neural Networks Based on White Pixels Evaluation
This paper presents a new method to automatic stop the iteration of Pulse Coupled Neural Networks. (PCNN) by evaluating the numbers of white pixels. The PCNN is used to segment the image which has object and background....
A PROPOSED AGENT BASED STORAGE VIRTUALISATION APPROACH: USING THE MAP-REDUCE PROGRAMMING MODEL
Increasing performance and decreasing cost of microprocessors are making it feasible to move more processing power to the data source. This allows us to investigate new methods of storage delivery and storage management...