Nothing Special   »   [go: up one dir, main page]

skip to main content
RFC1661: The Point-to-Point Protocol (PPP)1994 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 July 1994
Reflects downloads up to 23 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:

RFC Downloads

Cited By

  1. Li J, Lin Z, Qu J, Wu S, Zhou H, Liu Y, Ma X, Wang T, Luo X and Guan X (2024). Robust App Fingerprinting Over the Air, IEEE/ACM Transactions on Networking, 32:6, (5065-5080), Online publication date: 1-Dec-2024.
  2. De Keersmaeker F, Cao Y, Ndonda G and Sadre R (2023). A Survey of Public IoT Datasets for Network Security Research, IEEE Communications Surveys & Tutorials, 25:3, (1808-1840), Online publication date: 1-Jul-2023.
  3. Qu J, Ma X, Liu W, Sang H, Li J, Xue L, Luo X, Li Z, Feng L and Guan X Landing Reinforcement Learning onto Smart Scanning of The Internet of Things IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, (2088-2097)
  4. ACM
    Kelmendi K and Rexha B Enhancing Network Security in PPPoE protocol during the logical Local Loop Unbundling Proceedings of the 4th International Conference on Information and Network Security, (45-49)
  5. ACM
    Nishimura T A Flexible Router with Tangible Network Interfaces for Sharing a Last Mile Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, (303-308)
  6. Fontes H, Campos R and Ricardo M Improving ns-3 emulation support in real-world networking scenarios Proceedings of the 8th International Conference on Simulation Tools and Techniques, (261-266)
  7. ACM
    Nishimura T and Ogawa H Integrated Wireless Authentication System Proceedings of International Conference on Advances in Mobile Computing & Multimedia, (270-277)
  8. ACM
    Nishimura T A distributed authentication mechanism for sharing an overlay network among multiple organizations Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (813-817)
  9. Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
  10. ACM
    Priyantha N, Kansal A, Goraczko M and Zhao F Tiny web services Proceedings of the 6th ACM conference on Embedded network sensor systems, (253-266)
  11. Badra M and Urien P Adding Identity Protection to EAP-TLS Smartcards Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2951-2956)
  12. Zeng W, Lan J and Zhuang X (2006). Security for Multimedia Adaptation, IEEE MultiMedia, 13:2, (68-76), Online publication date: 1-Apr-2006.
  13. ACM
    Campos R and Ricardo M Dynamic autoconfiguration in 4G networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (7-11)
  14. Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)
  15. ACM
    Bellardo J and Savage S Measuring packet reordering Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (97-105)
  16. ACM
    Caporuscio M, Carzaniga A and Wolf A An experience in evaluating publish/subscribe services in a wireless network Proceedings of the 3rd international workshop on Software and performance, (128-133)
  17. ACM
    Hutchins R, Camp T and Enslow P (2019). A novel approach to mobility management, ACM SIGCOMM Computer Communication Review, 29:1, (86-96), Online publication date: 1-Jan-1999.
  18. ACM
    Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)
  19. ACM
    Fox A and Gribble S Security on the move Proceedings of the 2nd annual international conference on Mobile computing and networking, (155-164)
  20. ACM
    Cheshire S and Baker M (2019). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review, 26:4, (318-329), Online publication date: 1-Oct-1996.
  21. ACM
    Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)
Contributors
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations