O'Reilly logo

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility by Madjid Nakhjiri, Mahsa Nakhjiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

2.3. Further Resources

The field of authentication is a very well explored one and has seen many years of research and standardization. It seems however that with the advent of many new wireless and wired network technologies and many new services and application, this field is still going through a serious expansion as well as large number of customizations. For those reasons, it is very difficult for us to provide a comprehensive list of resources for further study; so we simply opt to provide links for the technologies that are covered in this chapter. Also the aim of this book is to provide a much better understanding of the various authentication issues for various scenarios throughout this book, so we are by no means done with the topic of authentication at this point.

Here are a few links to topics discussed in this chapter

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required