A Hash-Based EAP Authentication Protocol
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the development of secure authentication technologies, network authentication has already become an important approach to protect network security. IEEE802.1x, the widely used authentication protocol, is based on the Extensible Authentication Protocol(EAP). EAP provides a lot of specific protocols, most of which have their own advantages and disadvantages. The disvantages include lacking protection of user name and mutual authentication and difficulty in deployment. This paper presents a new hash-based authen- tication protocol, which aims to avoid the above disadvantages of protocols. Authentication process and security analysis is explained in detail. Comparison with some protocols is also provided.

    Reference
    Related
    Cited by
Get Citation

陈凤其,姚国祥.一种基于HASH函数的EAP认证协议.计算机系统应用,2010,19(6):74-77

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 13,2009
  • Revised:November 14,2009
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063