Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2018, Volume 30, Issue 2, Pages 113–148
DOI: https://doi.org/10.15514/ISPRAS-2018-30(2)-7
(Mi tisp312)
 

This article is cited in 4 scientific papers (total in 4 papers)

The review of Extensible Authentication Protocol and its methods

A. V. Nikeshina, V. Z. Shnitmanba

a Ivannikov Institute for System Programming of the Russian Academy of Sciences
b Moscow Institute of Physics and Technology (State University)
Full-text PDF (796 kB) Citations (4)
References:
Abstract: Authentication is associated with a scenario, in which some party (the applicant) presented the identity of the principal and states that this is the principal. Authentication allows some other party (verifier) to make sure that this statement is legitimate. Authentication is widely used in access control systems to networks and resources of computing systems. In this context, of considerable interest is the Extensible Authentication Protocol (EAP), specified by the IETF in RFC 3748, which provides an effective mechanism for embedding various authentication methods into it, as well as the proper methods of EAP authentication, some of which were standardized in specifications IETF. This article is a review of Extensible Authentication Protocol (EAP) and its methods, specified by IETF. EAP provide an effective flexible authentication mechanism that can be easily expanded with new authentication methods. The variety of mechanisms used to implement the authentication service are shown.
Keywords: security, authentication, access control, EAP, EAP methods.
Funding agency Grant number
Russian Foundation for Basic Research 16-07-00603
The work was performed under support of the Russian Foundation for Basic Research, research grant № 16-07-00603 "The verification of security functionality of the EAP authentication protocol and evaluation of the robustness of its implementations against attacks".
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: A. V. Nikeshin, V. Z. Shnitman, “The review of Extensible Authentication Protocol and its methods”, Proceedings of ISP RAS, 30:2 (2018), 113–148
Citation in format AMSBIB
\Bibitem{NikShn18}
\by A.~V.~Nikeshin, V.~Z.~Shnitman
\paper The review of Extensible Authentication Protocol and its methods
\jour Proceedings of ISP RAS
\yr 2018
\vol 30
\issue 2
\pages 113--148
\mathnet{http://mi.mathnet.ru/tisp312}
\crossref{https://doi.org/10.15514/ISPRAS-2018-30(2)-7}
\elib{https://elibrary.ru/item.asp?id=34996255}
Linking options:
  • https://www.mathnet.ru/eng/tisp312
  • https://www.mathnet.ru/eng/tisp/v30/i2/p113
  • This publication is cited in the following 4 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:400
    Full-text PDF :829
    References:25
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024