scholarly journals Extended HTTP Digest Access Authentication

Author(s):  
Henning Klevjer ◽  
Kent Are Varmedal ◽  
Audun Jøsang
2019 ◽  
Vol 16 (6) ◽  
pp. 18-30 ◽  
Author(s):  
Shaoyong Guo ◽  
Xing Hu ◽  
Ziqiang Zhou ◽  
Xinyan Wang ◽  
Feng Qi ◽  
...  

2020 ◽  
Vol 27 (6) ◽  
pp. 75-81
Author(s):  
Su Yao ◽  
Jianfeng Guan ◽  
Yinan Wu ◽  
Ke Xu ◽  
Mingwei Xu

2012 ◽  
Vol 7 (7) ◽  
pp. 148-156
Author(s):  
Peng Xiao ◽  
Jingsha He ◽  
Yingfang Fu ◽  
Ting Zhang

Author(s):  
Manuel Mogollon

Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication is essential for two parties to be able to trust in each other’s identities. Authentication is based on something you know (a password), on something you have (a token card, a digital certificate), or something that is part of you (fingerprints, voiceprint). A strong authentication requires at least two of these factors. The following mechanisms of authentication are described in this chapter: (1) IEEE 802.1X Access Control Protocol; (2) Extensible Authentication Protocol (EAP) and EAP methods; (3) traditional passwords; (4) Remote Authentication Dial-in Service (RADIUS); (5) Kerberos authentication service; and (6) X.509 authentication.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 71605-71616 ◽  
Author(s):  
Ting Cai ◽  
Zetao Yang ◽  
Wuhui Chen ◽  
Zibin Zheng ◽  
Yang Yu

Sign in / Sign up

Export Citation Format

Share Document