Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Conference Proceedings

An Inconvenient Truth About Tunneled Authentications

Published: October 10, 2010

Author(s)

Katrin Hoeper, Lily Chen

Conference

Name: 35th IEEE Conference on Local Computer Networks (LCN 2010)
Dates: October 10-14, 2010
Location: Denver, Colorado, United States
Citation: 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010), pp. 416-423

Abstract

Keywords

authentication; cryptographic binding; man-in-the-middle attack; protective tunnel; tunnel-based EAP method
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available