U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Conference Proceedings

An Inconvenient Truth About Tunneled Authentications

Published: October 10, 2010

Author(s)

Katrin Hoeper, Lily Chen

Conference

Name: 35th IEEE Conference on Local Computer Networks (LCN 2010)
Dates: October 10-14, 2010
Location: Denver, Colorado, United States
Citation: 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010), pp. 416-423

Announcement

Abstract

Keywords

authentication; cryptographic binding; man-in-the-middle attack; protective tunnel; tunnel-based EAP method
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available

Document History:
10/10/10: Conference Proceedings (Final)