Browse RFC

The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:

RFC Downloads

Cited By

De Keersmaeker F, Cao Y, Ndonda G and Sadre R (2023). A Survey of Public IoT Datasets for Network Security Research, IEEE Communications Surveys & Tutorials , 25 :3 , (1808-1840), Online publication date: 1-Jul-2023 .

Qu J, Ma X, Liu W, Sang H, Li J, Xue L, Luo X, Li Z, Feng L and Guan X Landing Reinforcement Learning onto Smart Scanning of The Internet of Things IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, (2088-2097)

Kelmendi K and Rexha B Enhancing Network Security in PPPoE protocol during the logical Local Loop Unbundling Proceedings of the 4th International Conference on Information and Network Security, (45-49)

Fontes H, Campos R and Ricardo M Improving ns-3 emulation support in real-world networking scenarios Proceedings of the 8th International Conference on Simulation Tools and Techniques, (261-266)

Nishimura T A Flexible Router with Tangible Network Interfaces for Sharing a Last Mile Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, (303-308)

Nishimura T and Ogawa H Integrated Wireless Authentication System Proceedings of International Conference on Advances in Mobile Computing & Multimedia, (270-277)

Nishimura T A distributed authentication mechanism for sharing an overlay network among multiple organizations Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (813-817)

Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces , 31 :1 , (128-136), Online publication date: 1-Jan-2009 .

Priyantha N, Kansal A, Goraczko M and Zhao F Tiny web services Proceedings of the 6th ACM conference on Embedded network sensor systems, (253-266)

Badra M and Urien P Adding Identity Protection to EAP-TLS Smartcards Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2951-2956)

Zeng W, Lan J and Zhuang X (2006). Security for Multimedia Adaptation, IEEE MultiMedia , 13 :2 , (68-76), Online publication date: 1-Apr-2006 .

Campos R and Ricardo M Dynamic autoconfiguration in 4G networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (7-11)

Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)

Caporuscio M, Carzaniga A and Wolf A An experience in evaluating publish/subscribe services in a wireless network Proceedings of the 3rd international workshop on Software and performance, (128-133)

Bellardo J and Savage S Measuring packet reordering Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (97-105)

Hutchins R, Camp T and Enslow P (2019). A novel approach to mobility management, ACM SIGCOMM Computer Communication Review , 29 :1 , (86-96), Online publication date: 1-Jan-1999 .

Schneier B and Mudge Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) Proceedings of the 5th ACM conference on Computer and communications security, (132-141)

Fox A and Gribble S Security on the move Proceedings of the 2nd annual international conference on Mobile computing and networking, (155-164)

Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)

Cheshire S and Baker M (2019). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review , 26 :4 , (318-329), Online publication date: 1-Oct-1996 .