메뉴 건너뛰기




Volumn 5, Issue 4, 2002, Pages 458-491

A Methodology for Analyzing the Performance of Authentication Protocols

Author keywords

Authentication; Design; Kerberos; Measurement; mobile computing; Performance; performance modeling; proxy servers; public key cryptography; Security

Indexed keywords


EID: 12844277408     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/581271.581275     Document Type: Article
Times cited : (18)

References (34)
  • 1
    • 8344261291 scopus 로고
    • Measured performance of data transmission over cellular telephone networks
    • Department of Computer Science, Report C-1994,-53. University of Helsinki, Helsinki, Finland. November
    • Alanko, T., Kojo, M., Laamanen, H., Liljeberg, M., Moilanen, M., Raatikainen, K., 1994. Measured performance of data transmission over cellular telephone networks. Department of Computer Science, Report C-1994,-53. University of Helsinki, Helsinki, Finland. November.
    • (1994)
    • Alanko, T.1    Kojo, M.2    Laamanen, H.3    Liljeberg, M.4    Moilanen, M.5    Raatikainen, K.6
  • 2
    • 0032669778 scopus 로고    scopus 로고
    • Transport layer security: How much does it really cost?
    • New York, New York, March). IEEE Computer Society Press, Los Alamitos, Calif
    • Apostolopoulos, G., Peris, V., Saha, D., 1999. Transport layer security: How much does it really cost? In Proceedings of IEEE INFOCOM'99 (New York, New York, March). IEEE Computer Society Press, Los Alamitos, Calif., pp. 717-725.
    • (1999) Proceedings of IEEE INFOCOM'99 , pp. 717-725
    • Apostolopoulos, G.1    Peris, V.2    Saha, D.3
  • 3
    • 0003588995 scopus 로고    scopus 로고
    • A survey of secure multi-domain distributed architectures
    • Faculty of Information Technology, Queensland University of Technology, Queensland, Australia
    • Ashely, P., Broom, B., 1997. A survey of secure multi-domain distributed architectures. Faculty of Information Technology, Queensland University of Technology, Queensland, Australia.
    • (1997)
    • Ashely, P.1    Broom, B.2
  • 4
    • 0003623495 scopus 로고    scopus 로고
    • Efficiency testing of ANSI C implementations of round 1 candidate algorithms for the advanced encryption standard
    • Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology
    • Bassham, L. E., 1999. Efficiency testing of ANSI C implementations of round 1 candidate algorithms for the advanced encryption standard. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology.
    • (1999)
    • Bassham, L.E.1
  • 5
    • 84958972496 scopus 로고    scopus 로고
    • D. Gollman, ed. Lecture Notes in Computer Science Springer-Verlag, Cambridge, UK
    • Blaze, M., 1996.High-Bandwidth Encryption with Low-Bandwidth Smartcards. D. Gollman, ed. Lecture Notes in Computer Science, vol. 1039. Springer-Verlag, Cambridge, UK, 33-40.
    • (1996) High-Bandwidth Encryption with Low-Bandwidth Smartcards. , vol.1039 , pp. 33-40
    • Blaze, M.1
  • 8
    • 0001429662 scopus 로고
    • Exception handling and tolerance of software faults
    • M. R. LYU, ed. Wiley, Chichester, UK
    • Cristian, F., 1995. Exception handling and tolerance of software faults. In Software Fault Tolerance, M. R. LYU, ed. Wiley, Chichester, UK, 81-107.
    • (1995) Software Fault Tolerance , pp. 81-107
    • Cristian, F.1
  • 9
    • 0032645708 scopus 로고    scopus 로고
    • Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
    • Red Sea, Egypt, July). IEEE Computer Society Press, Los Alamitos, Calif
    • El-Hadidi, M. T., Hegazi, N. H., Aslan, H. K., 1999. Performance evaluation of a new hybrid encryption protocol for authentication and key distribution. In Proceedings of the 4th IEEE International Symposium on Computers and Communications (Red Sea, Egypt, July). IEEE Computer Society Press, Los Alamitos, Calif.
    • (1999) Proceedings of the 4th IEEE International Symposium on Computers and Communications
    • El-Hadidi, M.T.1    Hegazi, N.H.2    Aslan, H.K.3
  • 12
    • 0034823294 scopus 로고    scopus 로고
    • Performance of public key-enabled Kerberos authentication in large networks
    • Oakland, Calif., May). IEEE Computer Society, Los Alamitos, Calif.
    • Harbitter, A., Menasce, D. A., 2001a. Performance of public key-enabled Kerberos authentication in large networks. In Proceedings of 2001 IEEE Symposium on Security and Privacy (Oakland, Calif., May). IEEE Computer Society, Los Alamitos, Calif., 170-183.
    • (2001) Proceedings of 2001 IEEE Symposium on Security and Privacy , pp. 170-183
    • Harbitter, A.1    Menasce, D.A.2
  • 14
    • 0033154262 scopus 로고    scopus 로고
    • W. effect considered harmful, 4K Associates
    • July-Aug.
    • Khare,R. 1999. W. effect considered harmful, 4K Associates. IEEE Internet Comput (July-Aug.), 89-92.
    • (1999) IEEE Internet Comput , pp. 89-92
    • Khare, R.1
  • 15
    • 0032154399 scopus 로고    scopus 로고
    • Elliptic curve cryptography delivers high performance and security for e-commerce
    • Lambert, P., 1998. Elliptic curve cryptography delivers high performance and security for e-commerce.Comput. Sec. J. XIV, 4, 23-29.
    • (1998) Comput. Sec. J. XIV , vol.4 , pp. 23-29
    • Lambert, P.1
  • 16
    • 0030368007 scopus 로고    scopus 로고
    • Mowgli WWW software: Improved usability of WWW in mobile WAN environments
    • Westminster, London, England, Nov.), IEEE Computer Society Press, Los Alamitos, Calif.
    • Liljebeg, M., Helin, H., Kojo, M., Raatikainen, K., 1996. Mowgli WWW software: Improved usability of WWW in mobile WAN environments. In Proceedings of IEEE GLOBECOM '96 (Westminster, London, England, Nov.), IEEE Computer Society Press, Los Alamitos, Calif., 33-37.
    • (1996) Proceedings of IEEE GLOBECOM '96 , pp. 33-37
    • Liljebeg, M.1    Helin, H.2    Kojo, M.3    Raatikainen, K.4
  • 17
    • 85028849727 scopus 로고
    • A performance study of DCE 1.0.1 cell directory service: Implications for application and tool programmers
    • International Workshop OSF DCE, Karlsruhe, Germany, Oct
    • Martinka, J. J., Friedrich, R. J., Friedenbach, P. M., Sienknecht, T. F., 1993. A performance study of DCE 1.0.1 cell directory service: Implications for application and tool programmers.Networked Systems Architecture, Hewlett-Packard. International Workshop OSF DCE, Karlsruhe, Germany, Oct.
    • (1993) Networked Systems Architecture, Hewlett-Packard.
    • Martinka, J.J.1    Friedrich, R.J.2    Friedenbach, P.M.3    Sienknecht, T.F.4
  • 18
    • 0004135392 scopus 로고    scopus 로고
    • Public key utilizing tickets for application servers (PKTAPP
    • Medvinsky, A., Hur, M., Neuman, C., 1997. Public key utilizing tickets for application servers (PKTAPP). www.ietf.org,http://www.ietf.org/internet-drafts/draft-ietf-cat-kerberos-pk-tapp-03.txt.
    • (1997)
    • Medvinsky, A.1    Hur, M.2    Neuman, C.3
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R. M., Schroeder, M. D., 1978. Using encryption for authentication in large networks of computers.Commun. ACM 21, 993-999.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 23
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman, B., Ts'O, T., 1994. Kerberos: An authentication service for computer networks.IEEE Commun. Magazine 32, 9, 33-38.
    • (1994) IEEE Commun. Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'O, T.2
  • 24
    • 85024272581 scopus 로고    scopus 로고
    • Performance evaluation of the IS-41 security mechanisms in a PCS supporting intelligent network services
    • Bordeaux, France, May). IEEE Computer Society Press, Los Alamitos, Calif.
    • Orozco-Barbosa, L., Serrano, L., Quiroz, E., 1998. Performance evaluation of the IS-41 security mechanisms in a PCS supporting intelligent network services. In Proceedings of IEEE IN'98 Workshop (Bordeaux, France, May). IEEE Computer Society Press, Los Alamitos, Calif., 142-154.
    • (1998) Proceedings of IEEE IN'98 Workshop , pp. 142-154
    • Orozco-Barbosa, L.1    Serrano, L.2    Quiroz, E.3
  • 25
    • 0010224357 scopus 로고
    • A survey of mean value analysis, its generalizations, and applications, for networks of queues
    • William I. Simon Graduate School of Business Administration, University of Rochester, Rochester, N.Y.
    • Schweitzer, P. J., 1991. A survey of mean value analysis, its generalizations, and applications, for networks of queues. William I. Simon Graduate School of Business Administration, University of Rochester, Rochester, N.Y.
    • (1991)
    • Schweitzer, P.J.1
  • 26
    • 0030643360 scopus 로고    scopus 로고
    • Distributed authentication in Kerberos using public key cryptography
    • San Diego, Calif., Feb.), IEEE Computer Society Press, Los Alamitos, Calif
    • Sibbu, M. A., Chuang, J.C.-I., 1997. Distributed authentication in Kerberos using public key cryptography. In Proceedings of Symposium on Network and Distributed System Security (San Diego, Calif., Feb.), IEEE Computer Society Press, Los Alamitos, Calif.
    • (1997) Proceedings of Symposium on Network and Distributed System Security
    • Sibbu, M.A.1    Chuang, J.C.-I.2
  • 27
    • 0003623968 scopus 로고
    • Kerberos keeps the enterprise secure
    • Stallings, W., 1994. Kerberos keeps the enterprise secure. In Data Communications, 103-111.
    • (1994) Data Communications , pp. 103-111
    • Stallings, W.1
  • 28
    • 0003428414 scopus 로고    scopus 로고
    • Addison-Wesley, Reading, Mass
    • Stevens, W. R., 1999.TCP/IP Illustrated, vol. 1. Addison-Wesley, Reading, Mass.
    • (1999) TCP/IP Illustrated , vol.1
    • Stevens, W.R.1
  • 29
    • 85024277532 scopus 로고    scopus 로고
    • Initial and padd through authentication using Kerberos V5 and the GSS-API (IAKERB
    • Swift, M., Trostle, J., Aboba, B., Zorn, G., 2001. Initial and padd through authentication using Kerberos V5 and the GSS-API (IAKERB), IETF.
    • (2001) IETF
    • Swift, M.1    Trostle, J.2    Aboba, B.3    Zorn, G.4
  • 32
    • 0033154297 scopus 로고    scopus 로고
    • Internet protocol performance over networks with wireless links
    • Xylomenos, G., Polyzos, G. C., 1999. Internet protocol performance over networks with wireless links.IEEENetw. 13, 4, 55-63.
    • (1999) IEEENetw. , vol.13 , Issue.4 , pp. 55-63
    • Xylomenos, G.1    Polyzos, G.C.2
  • 33
    • 0033344463 scopus 로고    scopus 로고
    • A general purpose proxy filtering mechanism applied to the mobile environment
    • Zenel, B., 1999. A general purpose proxy filtering mechanism applied to the mobile environment. Wireless Netw. 5, 391-409.
    • (1999) Wireless Netw. , vol.5 , pp. 391-409
    • Zenel, B.1
  • 34
    • 2442608984 scopus 로고
    • Security versus performance requirements in data communications systems. D. Gollman, ed
    • Brighton, U.K., Nov.
    • Zorkadis, V., 1994. Security versus performance requirements in data communications systems. D. Gollman, ed. In Proceedings of Computer Security-ESORICS 94 (Brighton, U.K., Nov.) 19-30.
    • (1994) Proceedings of Computer Security-ESORICS , vol.94 , pp. 19-30
    • Zorkadis, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.