Bulid campus network authentication system based on centralized 802.1x

被引:0
|
作者
机构
[1] Liu, Bin
[2] He, Yu-Zhi
[3] Zhang, Yong
来源
Liu, Bin | 1600年 / Editorial Board of Journal on Communications卷 / 35期
关键词
D O I
10.3969/j.issn.1000-436x.2014.z1.017
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] AAA Based on 802.1x Authentication
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    Ma, Jun
    PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 527 - 530
  • [2] Design in the Authentication and Billing System Based on Radius and 802.1x Protocol
    Chen, Chaoyi
    Zhang, Jianyong
    Liu, Junli
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1438 - 1443
  • [3] Research of AAA messages Based on 802.1x Authentication
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    Ma, Jun
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 618 - 621
  • [4] Authentication in an integrated 802.1x based WLAN AND CDMA2000-1x network
    Mahapatra, A
    Uma, R
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 227 - 231
  • [5] Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster
    Watanabe, Toshiki
    Kinoshita, Shunichi
    Yamasaki, Yasuhiro
    Goto, Hideaki
    Sone, Hideaki
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 385 - 390
  • [6] Effects of the EAPOL, timers in IEEE 802.1X authentication
    Sung, Ya-Chin
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (06) : 2276 - 2281
  • [7] Comparative analysis of IEEE 802.1x authentication methods
    Akhlaq, Monis
    Aslam, Baber
    Khan, Muzammiil A.
    Jafri, M. Noman
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 1 - +
  • [8] Research on the 802.1x Authentication Mechanism and Existing Defects
    Wang, Xingong
    ADVANCED MECHANICAL ENGINEERING II, 2012, 192 : 385 - 389
  • [9] An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol
    Chen, Han-Ying
    Liu, Xiao-Li
    FUZZY SYSTEMS AND DATA MINING II, 2016, 293 : 407 - 413
  • [10] Secure, fast handhoff techniques for 802.1X based wireless network
    Maccari, Leonardo
    Fantacci, Romano
    Pecorella, Tommaso
    Frosali, Federico
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3917 - 3922