(redirected from Challenge Handshake Authentication Protocol)
Category filter:
CHAPChallenge-Handshake Authentication Protocol
CHAPCommunity Health Accreditation Program
CHAPCommon Humanitarian Action Plan
CHAPChallenge Handshake Authentication Protocol
CHAPCommunity Health Alliance of Pasadena (Pasadena, CA)
CHAPCommunity Health Aide Program
CHAPChronic Hazard Advisory Panel
CHAPChicago Health and Aging Project
CHAPChannel Processor
CHAPChristian Homeschool Association of Pennsylvania
CHAPChildhope Asia Philippines
CHAPCadet Harassment and Abuse Prevention (Canada)
CHAPChildren Have A Potential
CHAPCommunity Health Advocacy Program
CHAPCommunity Health Action Project
CHAPChildren's Hospitalization Alternative Program
CHAPCommon Hybrid Agent Platform
CHAPCompton High-Altitude Pulse
CHAPCouncil of Health Agencies of the Philippines
CHAPContractor Held Air Force Property
CHAPChemical Hazard Awareness Program
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
In case of the authentication protocol, this work used CHAP (Challenge Handshake Authentication Protocol).
The modem establishes a connection using the Point-to-Point protocol with 128-bit password encryption and continuous re-authentication via CHAP (Challenge Handshake Authentication Protocol).
The 9300-Rades also incorporates the Challenge Handshake Authentication Protocol.
PEAP is a computer-based certificate model that uses Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2), for authentication.
DH-CHAP: Diffie-Hellman Challenge Handshake Authentication Protocol
McDATA is aligned with multiple vendors and standards committees, including the IETF (Internet Engineering Task Force) working group responsible for security standards for iSCSI and FCIP, to incorporate advanced authentication techniques into storage networks through the Challenge Handshake Authentication Protocol (CHAP).
VPNs offer several other industry-standard authentication methods, including Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) and Password Authentication Protocol (PAP).
Several authentication methods are available while configuring authentication in an iSCSI network if they are supported in an iSCSI product, including Kerberos V5 (KRB5) [RFC 1510], Simple public-Key GSS-API Mechanism (SPKM) [RFC 2025], Secure Remote Password (SRP) [RFC2945], Challenge Handshake Authentication Protocol (CHAP) [RFC 1944] and No Authentication (NONE).
True, security is addressed by IP storage standards--both iSCSI and network attached storage protocols rely on IPsec for network encryption, and iSCSI mandates the use of the Challenge Handshake Authentication Protocol (CHAP) for host identification.