International Journal of Cyber and IT Service Management (IJCITSM)
Vol. 2 No. 1 (2022): April

Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security

Ellen Dolan (Queensland University)
Riya Widayanti (University of Esa Unggul)

Article Info

Publish Date
23 Mar 2022


Because of the growing number of apps that use client servers, both desktop and WEB applications, each user must learn a large number of user ids and passwords, because each application requires authentication in order to use it for security reasons. Furthermore, the development of network media, both wired and wireless, is accelerating. In the scenarios stated above, RADIUS (Remote Authentication Dial-In User Service) technology is required since the RADIUS approach allows a user to utilize a single user id to access several applications, both desktop and web-based. The RADIUS protocol may be used with both wired and wireless media.

Copyrights © 2022

Journal Info





Computer Science & IT Decision Sciences, Operations Research & Management


International Journal of Cyber and Service Management (IJCITSM) is an international peer-reviewed journal that publishes high quality and refereed papers which reports original research and innovative applications in all areas of Computer Science, Informatics, Electronics Engineering, Communication ...