A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Analysis and Implementation of the Authentication Protocol 802. 1x
2014
International Journal of Computer Applications
The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks [1]. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from pretending any one of them [2] . Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE
doi:10.5120/15200-3587
fatcat:kvaenpqwnbctpc2gmaajw2gsdm