Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. System Admin
  4. help in thesis methodology

help in thesis methodology

Scheduled Pinned Locked Moved System Admin
helpsecurityquestion
7 Posts 2 Posters 3 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    seemazaib
    wrote on last edited by
    #1

    there is no such work perform on authentication between two access points.I also not find any literature review at such topic.Problem is coming in methodology.I suggest to propose a framework on it.There must be some modules.I suggest use 802.1x technique and cryptography method.I want to explore it but no one helping me.Also my instructor.No one show me the right track or path.I donot know it is possible or not.But why it is not possible?how i make it possible.Please Please help me for God sake

    L S 2 Replies Last reply
    0
    • S seemazaib

      there is no such work perform on authentication between two access points.I also not find any literature review at such topic.Problem is coming in methodology.I suggest to propose a framework on it.There must be some modules.I suggest use 802.1x technique and cryptography method.I want to explore it but no one helping me.Also my instructor.No one show me the right track or path.I donot know it is possible or not.But why it is not possible?how i make it possible.Please Please help me for God sake

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      Are you asking about the methodology of trusting relationships between computers?

      1 Reply Last reply
      0
      • S seemazaib

        there is no such work perform on authentication between two access points.I also not find any literature review at such topic.Problem is coming in methodology.I suggest to propose a framework on it.There must be some modules.I suggest use 802.1x technique and cryptography method.I want to explore it but no one helping me.Also my instructor.No one show me the right track or path.I donot know it is possible or not.But why it is not possible?how i make it possible.Please Please help me for God sake

        S Offline
        S Offline
        seemazaib
        wrote on last edited by
        #3

        built a trusted relation ship between two access point.How i propose a frame work for that problem or a protocol.i need a flow on that problem.

        L 1 Reply Last reply
        0
        • S seemazaib

          built a trusted relation ship between two access point.How i propose a frame work for that problem or a protocol.i need a flow on that problem.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #4

          A little bit of light reading for you ... hope they help, if not, redefine you question. http://www.academypublisher.com/jcp/vol01/no02/jcp01024253.pdf[^] http://reference.kfupm.edu.sa/content/o/n/on_trust_for_ubiquitous_computing_103942.pdf[^] http://www.agreement-technologies.eu/wp-content/uploads/2010/07/trustmathandcompmodellingdt.pdf[^]

          S 1 Reply Last reply
          0
          • L Lost User

            A little bit of light reading for you ... hope they help, if not, redefine you question. http://www.academypublisher.com/jcp/vol01/no02/jcp01024253.pdf[^] http://reference.kfupm.edu.sa/content/o/n/on_trust_for_ubiquitous_computing_103942.pdf[^] http://www.agreement-technologies.eu/wp-content/uploads/2010/07/trustmathandcompmodellingdt.pdf[^]

            S Offline
            S Offline
            seemazaib
            wrote on last edited by
            #5

            can authentication between two access points is possible or not?My field is networking and my thesis is related to wireless LAN security.All solution and work is done on authentication between access point and Mobile station.Can only authentication perform between two Access point devices or not?

            L 1 Reply Last reply
            0
            • S seemazaib

              can authentication between two access points is possible or not?My field is networking and my thesis is related to wireless LAN security.All solution and work is done on authentication between access point and Mobile station.Can only authentication perform between two Access point devices or not?

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #6

              Cisco company www.cisco.com[^] have a huge depository of information you may find of interest including stuff on "wireless access point authentication". But you will need to search their depository to find what you need. That said, you may also find something to interest you here https://www.opennetworking.org/[^]

              S 1 Reply Last reply
              0
              • L Lost User

                Cisco company www.cisco.com[^] have a huge depository of information you may find of interest including stuff on "wireless access point authentication". But you will need to search their depository to find what you need. That said, you may also find something to interest you here https://www.opennetworking.org/[^]

                S Offline
                S Offline
                seemazaib
                wrote on last edited by
                #7

                I did not find any thing on that side.Please how i design a layerd framework for access point authentication.What input and what will be out put.How define objectives for the authentication between two access points before perform a handoff for mobile user. Please you are network person help me.I am very sad.

                1 Reply Last reply
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Don't have an account? Register

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups