Now showing items 1-1 of 1

    • Algorithm for Selection of EAP Authentic 

      Mwathi, David Gitonga 1; Okello-Odongo, William 2 ,; Opiyo, Elisha 3 (2016-06)
      ABSTRACT Several recent studies indicate that many implementations of authentication and access control in public WLANs are compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to ...