Analysis and Implementation of the Authentication Protocol 802.1x

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from pretending any one of them. Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE 802.11b or 802.11g it can be applied also to wired networks.
Download Now

Find By Topic