Skip Abstract Section
Abstract
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:
RFC Downloads
ZIP
Cited By
- Li J, Lin Z, Qu J, Wu S, Zhou H, Liu Y, Ma X, Wang T, Luo X and Guan X (2024). Robust App Fingerprinting Over the Air, IEEE/ACM Transactions on Networking, 32:6, (5065-5080), Online publication date: 1-Dec-2024.
- De Keersmaeker F, Cao Y, Ndonda G and Sadre R (2023). A Survey of Public IoT Datasets for Network Security Research, IEEE Communications Surveys & Tutorials, 25:3, (1808-1840), Online publication date: 1-Jul-2023.
- Qu J, Ma X, Liu W, Sang H, Li J, Xue L, Luo X, Li Z, Feng L and Guan X Landing Reinforcement Learning onto Smart Scanning of The Internet of Things IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, (2088-2097)
- Kelmendi K and Rexha B Enhancing Network Security in PPPoE protocol during the logical Local Loop Unbundling Proceedings of the 4th International Conference on Information and Network Security, (45-49)
- Nishimura T A Flexible Router with Tangible Network Interfaces for Sharing a Last Mile Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, (303-308)
- Fontes H, Campos R and Ricardo M Improving ns-3 emulation support in real-world networking scenarios Proceedings of the 8th International Conference on Simulation Tools and Techniques, (261-266)
- Nishimura T and Ogawa H Integrated Wireless Authentication System Proceedings of International Conference on Advances in Mobile Computing & Multimedia, (270-277)
- Nishimura T A distributed authentication mechanism for sharing an overlay network among multiple organizations Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (813-817)
- Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
- Priyantha N, Kansal A, Goraczko M and Zhao F Tiny web services Proceedings of the 6th ACM conference on Embedded network sensor systems, (253-266)
- Badra M and Urien P Adding Identity Protection to EAP-TLS Smartcards Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2951-2956)
- Zeng W, Lan J and Zhuang X (2006). Security for Multimedia Adaptation, IEEE MultiMedia, 13:2, (68-76), Online publication date: 1-Apr-2006.
- Campos R and Ricardo M Dynamic autoconfiguration in 4G networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (7-11)
- Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)
- Bellardo J and Savage S Measuring packet reordering Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (97-105)
- Caporuscio M, Carzaniga A and Wolf A An experience in evaluating publish/subscribe services in a wireless network Proceedings of the 3rd international workshop on Software and performance, (128-133)
- Hutchins R, Camp T and Enslow P (2019). A novel approach to mobility management, ACM SIGCOMM Computer Communication Review, 29:1, (86-96), Online publication date: 1-Jan-1999.
- Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)
- Fox A and Gribble S Security on the move Proceedings of the 2nd annual international conference on Mobile computing and networking, (155-164)
- Cheshire S and Baker M (2019). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review, 26:4, (318-329), Online publication date: 1-Oct-1996.
- Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)
Please enable JavaScript to view thecomments powered by Disqus.