Explore and compare two authentication protocols developed for Point-to-Point Protocol (PPP): the Password Authentication Protocol (PAP) and the Challenge Handshake Authentication Protocol (CHAP).
Also find me here:
Baeldung Author
baeldung
This is the standard author on the site. Most articles are published by individual authors, with their own profiles, but when multiple people have a strong contribution, we publish collectively here.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Machine Learning (45)
- Algorithms (41)
- Networking (40)
- Programming (36)
- Math and Logic (30)
- OS (19)
- Computer Vision (19)
- Artificial Intelligence (18)
- Deep Learning (16)
- Trees (15)
- Data Structures (15)
- Security (14)
- Latex (13)
- Sorting (12)
- Software Architecture (11)
- Core Concepts (10)
- Graphs (8)
- Searching (6)
- Web (4)
- Graph Traversal (4)
- Data Science (4)
- Series (3)
- Path Finding (3)
- Graph Theory (3)
- Concurrency (1)
What Is Image Stitching?
Filed under Computer Vision
A quick and practical guide to image stitching.
What Is the Bellman Operator in Reinforcement Learning?
Filed under Machine Learning
Learn how Bellman equation is used in enforcing reinforcement learning.
How Does the Socket API accept() Function Work?
Filed under Networking
Explore the socket programming components, specifically the socket listening component, which we call the accept() function.
How to Center Titles in LaTeX
Filed under Latex
Learn how to center titles in LaTeX by using the default functions and the specialized package sectsty.
Internetwork Packet Exchange Explained
Filed under Networking
Explore an important networking protocol, the Internetwork Packet Exchange (IPX).
Wireless Authentication Protocols
Filed under Security
Explore the wireless authentication protocols.
Data Access Layer Explained
Filed under Software Architecture
Explore the general architecture of an application and the data access layer (DAL) in particular.
What Is A Hopfield Network?
Filed under Machine Learning
Learn about the Hopfield Network, its characteristics, basic architecture, and training.