메뉴 건너뛰기




Volumn 4435 LNCS, Issue , 2007, Pages 167-181

Breaking and fixing public-key kerberos

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER SCIENCE; COMPUTER SOFTWARE; TECHNOLOGY;

EID: 49949119291     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77505-8_13     Document Type: Conference Paper
Times cited : (8)

References (26)
  • 4
    • 49949116722 scopus 로고    scopus 로고
    • Strasser, M., Steffen, A.: Kerberos PKINIT Implementation for Unix Clients. Technical report, Zurich University of Applied Sciences Winterthur (2002)
    • Strasser, M., Steffen, A.: Kerberos PKINIT Implementation for Unix Clients. Technical report, Zurich University of Applied Sciences Winterthur (2002)
  • 5
    • 49949120078 scopus 로고    scopus 로고
    • CERT
    • CERT: Vulnerability Note 477341 (2005), http://www.kb.cert.org/vuls/id/ 477341
    • (2005) Vulnerability Note 477341
  • 6
    • 49949098433 scopus 로고    scopus 로고
    • Yu, T, Hartman, S, Raeburn, K, The perils of unauthenticated encryption: Kerberos version 4. In: Proc. NDSS 2004 2004
    • Yu, T., Hartman, S., Raeburn, K.: The perils of unauthenticated encryption: Kerberos version 4. In: Proc. NDSS 2004 (2004)
  • 9
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptology 7, 79-130 (1994)
    • (1994) J. Cryptology , vol.7 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 10
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the nrl protocol analyzer
    • Meadows, C.: Analysis of the internet key exchange protocol using the nrl protocol analyzer. In: Proc. IEEE Symp. Security and Privacy, pp. 216-231 (1999)
    • (1999) Proc. IEEE Symp. Security and Privacy , pp. 216-231
    • Meadows, C.1
  • 12
    • 33750226088 scopus 로고    scopus 로고
    • Cryptographically Sound Security Proofs for Basic and Public-key Kerberos
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.K.: Cryptographically Sound Security Proofs for Basic and Public-key Kerberos. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189
    • Backes, M.1    Cervesato, I.2    Jaggard, A.D.3    Scedrov, A.4    Tsay, J.K.5
  • 13
    • 77956142065 scopus 로고    scopus 로고
    • IETF:, RFC 4556. Preliminary versions available as a sequence of Internet Drafts at
    • IETF: Public Key Cryptography for Initial Authentication in Kerberos (1996-2006) RFC 4556. Preliminary versions available as a sequence of Internet Drafts at, http://tools.ietf.org/wg/krb-wg/draft-ietf-cat-kerberos-pk-init/
    • (1996) Public Key Cryptography for Initial Authentication in Kerberos
  • 16
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks. SIAM J. Computing 17, 281-308 (1988)
    • (1988) SIAM J. Computing , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 18
    • 84869635960 scopus 로고    scopus 로고
    • Security Analysis of IKE's Signature-Based Key-Exchange Protocol
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS. vol. 2442, pp. 143-161. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe. G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 0002885224 scopus 로고    scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22, 6-15 (1996)
    • (1996) IEEE Trans. Software Eng , vol.22 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 23
    • 84955619856 scopus 로고    scopus 로고
    • Typed MSR: Syntax and Examples
    • Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
    • Cervesato, I.: Typed MSR: Syntax and Examples. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2052
    • Cervesato, I.1
  • 24
    • 3042538605 scopus 로고    scopus 로고
    • Multiset Rewriting and the Complexity of Bounded Security Protocols
    • Durgin, N.A., Lincoln, P., Mitchell, J., Scedrov. A.: Multiset Rewriting and the Complexity of Bounded Security Protocols. J. Comp. Security 12, 247-311 (2004)
    • (2004) J. Comp. Security , vol.12 , pp. 247-311
    • Durgin, N.A.1    Lincoln, P.2    Mitchell, J.3    Scedrov, A.4
  • 25
    • 1442292329 scopus 로고    scopus 로고
    • A Composable Cryptographic Library with Nested Operations
    • ACM, New York 2003
    • Backes, M., Pfitzmann, B., Waidner, M.: A Composable Cryptographic Library with Nested Operations. In: Proc. CCS 2003, pp. 220-230. ACM, New York (2003)
    • (2003) Proc. CCS , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.