skip to main content
RFC1994: PPP Challenge Handshake Authentication Protocol (CHAP)1996 RFC
Bibliometrics
Skip Abstract Section
Abstract

The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links.

RFC Downloads

Cited By

  1. ACM
    Schmidbauer T, Keller J and Wendzel S Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-10)
  2. ACM
    Taranov K, Rothenberger B, De Sensi D, Perrig A and Hoefler T NeVerMore Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (2765-2778)
  3. Gunleifsen H, Kemmerich T and Gkioulos V (2019). Dynamic setup of IPsec VPNs in service function chaining, Computer Networks: The International Journal of Computer and Telecommunications Networking, 160:C, (77-91), Online publication date: 4-Sep-2019.
  4. ACM
    Dey B, Vishnu S and Swarnkar O An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs Proceedings of the 2nd International Conference on Digital Signal Processing, (125-131)
  5. ACM
    Kelmendi K and Rexha B Enhancing Network Security in PPPoE protocol during the logical Local Loop Unbundling Proceedings of the 4th International Conference on Information and Network Security, (45-49)
  6. Liu F, Xie T, Feng Y and Feng D (2012). On the security of PPPoE network, Security and Communication Networks, 5:10, (1159-1168), Online publication date: 1-Oct-2012.
  7. Xu M and Radcliffe P (2011). Building Secure Tunnel from PPP Wireless Network, Wireless Personal Communications: An International Journal, 58:2, (337-353), Online publication date: 1-May-2011.
  8. ACM
    Jeong J, Kwon T and Choi Y Host-oblivious security for content-based networks Proceedings of the 5th International Conference on Future Internet Technologies, (35-40)
  9. ACM
    Nishimura T A distributed authentication mechanism for sharing an overlay network among multiple organizations Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (813-817)
  10. Guillet T, Moalla R, Serhrouchni A and Obaid A SIP authentication based on HOTP Proceedings of the 7th international conference on Information, communications and signal processing, (685-688)
  11. ACM
    Wang L, Ohta K and Kunihiro N Password recovery attack on authentication protocol MD4(Password||Challenge) Proceedings of the 2008 ACM symposium on Information, computer and communications security, (3-9)
  12. ACM
    Perlman R and Kaufman C User-centric PKI Proceedings of the 7th symposium on Identity and trust on the Internet, (59-71)
  13. ACM
    Liu D and Coslow M Extensible authentication protocols for IEEE standards 802.11 and 802.16 Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-9)
  14. Sasaki Y, Wang L, Ohta K and Kunihiro N Password recovery on challenge and response Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, (290-307)
  15. Liang Zhang , Seta N, Miyajima H and Hayashi H Fast Authentication Based on Heuristic Movement Prediction for Seamless Handover in Wireless Access Environment Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2889-2893)
  16. Akhlaq M, Aslam B, Khan M and Jafri M Comparative analysis of IEEE 802.1x authentication methods Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (1-6)
  17. Stylianides N, Stephanopoulos G, Tselikis G and Dopher M (2005). Signaling Performance Trials and Evaluation Results on a GPRS Platform, Information Systems Frontiers, 7:2, (129-140), Online publication date: 1-May-2005.
  18. Kim B and Hong S (2018). Secure Mutual Authentication for Ad hoc Wireless Networks, The Journal of Supercomputing, 33:1, (123-132), Online publication date: 1-Jul-2005.
  19. Drakopoulos E (2019). Enterprise network planning and design, Computer Communications, 22:4, (340-352), Online publication date: 1-Mar-1999.
  20. Metz C (2018). A Pointed Look at the Point-to-Point Protocol, IEEE Internet Computing, 3:4, (85-88), Online publication date: 1-Jul-1999.
  21. ACM
    Bhagwat P, Korpeoglu I, Bisdikian C, Naghshineh M and Tripathi S BlueSky Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, (69-76)
  22. ACM
    Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)
Contributors

Recommendations