The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
the Extensible Authentication Protocol (EAP) is a generic ramework supporting multiple types of authentication ethods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another uthenticator. The EAP reauthentication Protocol provides a onsistent, ethodindependent and low-latency -authentication. It is extension to current EAP mechanism to upport intradomain handoff authentication. This paper nalyzed the performance of the EAP re-authentication rotocol, and compared it with that of the EAP-TLS protocol. he result shows that the authentication delay of EAP eauthentication protocol is only twentieth of that in the EAPTLS protocol.
Authors and Affiliations
Seema Mehla , Bhawna Gupta
Analysis of Maintainability Models for Object Oriented System
There is always has been a demand to provide efficient and effective high quality software. There are various maintainability objects to provide better maintainability. The quality of good software design heavily effecti...
Android in opposition to iPhone
The paper is an analysis and comparison of the android mobile OS with the iPhone which have ruled the mobile market in past years today is facing a downfall just because of the introduction of this new OS. Android with i...
Road Recognition for Vision Navigation of Robot by Using Computer Vision
This paper presents a method for vision navigation of robot by road recognition based on image processing. By taking advantages of the unique structure in road images, the square images on road can be scanned while the r...
Study and Constructing RDF model for a well formatted Valid XML document
In recent years semantic web is one of the technologies to make the WWW as machineunderstandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (Web) resources. The RDF da...
FREQUENT DATA GENERATION USING RELATIVE DATA ANALYSIS
Traditional association rule mining method mines association rules only for the items bought by the customer. However an actual transaction consists of the items bought by the customer along with the quantity of items bo...