A. Yegin, Y. Ohba, R. Penno, G. Tsirtsis, and C. Wang, Protocol for carrying authentication for network access (PANA) Requirements, IETF RFC, vol.4058, 2005.
DOI : 10.17487/rfc4058

D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin, Protocol for carrying authentication for network access (PANA), 2008.
DOI : 10.17487/rfc5191

C. Rigney, S. Willens, A. Rubens, and A. Simpson, Remote authentication dial in user service (RADIUS). IETF RFC 2865, 2000.

B. Aboba and P. Calhoun, RADIUS (remote authentication dial in user service) support for extensible authentication protocol (EAP), IETF RFC, vol.3579, 2003.
DOI : 10.17487/rfc3579

B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible authentication protocol (EAP). IETF RFC 3748, 2004.
DOI : 10.17487/rfc3748

L. Blunk and J. Vollbrecht, PPP extensible authentication protocol (EAP) IETF RFC 2284, Standards Track 8, Kaufman C, 1998.
DOI : 10.17487/rfc2284

P. Eronen, T. Hiller, and G. Zorn, Diameter extensible authentication protocol (EAP) application. IETF RFC 4072, 2005.

T. Dierks and E. Rescorla, The transport layer security (TLS) protocol version 1.2. IETF RFC 5246, 2008.

R. Dantu, G. Clothier, and A. Atri, EAP methods for wireless networks, Computer Standards & Interfaces, vol.29, issue.3, pp.289-301, 2007.
DOI : 10.1016/j.csi.2006.04.001

J. Lei, X. Fu, D. Hogrefe, and J. Tan, Comparative studies on authentication and key exchange methods for 802.11 wireless LAN, Computers & Security, vol.26, issue.5, pp.401-409, 2007.
DOI : 10.1016/j.cose.2007.01.001

O. Cheikhrouhou, M. Laurent-maknavicius, B. Jemaa, and M. , Nouvelle méthode d'authentification EAP-EHash " , 12ème Colloque Francophone sur l'Ingénierie des Protocoles CFIP'2006, Hermès Science et Publication, 2006.

W. Simpson, PPP challenge handshake authentication protocol (CHAP). IETF RFC, 1994.
DOI : 10.17487/rfc1994

T. Dierks and C. Allen, The TLS protocol version 1.0. IETF RFC 2246, 1998.

F. Bersani and H. Tschofenig, The EAP-PSK protocol: a preshared key extensible authentication protocol (EAP) Method, IETF RFC, vol.4764, 2007.
DOI : 10.17487/rfc4764

M. Vanderveen and H. Soliman, Extensible Authentication protocol method for shared-secret authentication and key establishment (EAP-SAKE), IETF RFC, vol.4763, 2006.
DOI : 10.17487/rfc4763

T. Clancy and H. Tschofenig, Extensible authentication protocol ?generalized pre-shared key (EAP-GPSK) Method. IETF RFC 5433, 2009.
DOI : 10.17487/rfc5433

T. Clancy and W. Arbaugh, Extensible authentication protocol (EAP) password authenticated exchange. IETF RFC 4746, Informational 21 The EAP protected one-time password protocol (EAP-POTP), Nystroem M IETF RFC, vol.4793, 2006.
DOI : 10.17487/rfc4746

N. Cam-winget, D. Mcgrew, J. Salowey, and H. Zhou, The Flexible authentication via secure tunneling extensible authentication protocol method (EAP-FAST), IETF RFC, vol.4851, 2007.
DOI : 10.17487/rfc4851

D. Stanley, J. Walker, and B. Aboba, Extensible authentication protocol (EAP) method requirements for wireless LANs, IETF RFC, vol.4017, 2005.
DOI : 10.17487/rfc4017

B. Aboba, D. Simon, and P. Eronen, Extensible authentication protocol (EAP) key management framework, IETF RFC, vol.5247, 2007.
DOI : 10.17487/rfc5247

B. Donovan, P. Norris, and G. Lowe, Analyzing a library of security protocols using casper and FDR, Workshop on Formal Methods and Security Protocols, 1999.

E. Rntl, Explication et Vérification Automatique de protocoles cryptographiques, 2001.

Y. Chevalier, L. Compagna, J. Cuellar, P. Drielsma, J. Mantovani et al., A high level protocol specification language for industrial security-sensitive protocols, Proc Automated Software Eng, vol.180, pp.193-205, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00100219

V. Narayanan and L. Dondeti, EAP extensions for EAP reauthentication protocol (ERP) IETF RFC 5296, 2008.