메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 115-129

A browser-based Kerberos authentication scheme

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; SECURITY SYSTEMS;

EID: 57049132145     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_8     Document Type: Conference Paper
Times cited : (17)

References (24)
  • 2
    • 57049116609 scopus 로고    scopus 로고
    • Allen, C, Dierks, T, The TLS protocol -version 1.1. Internet proposed standard RFC 4346 2006
    • Allen, C., Dierks, T.: The TLS protocol -version 1.1. Internet proposed standard RFC 4346 (2006)
  • 4
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • ACM Press, New York
    • Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Conference on Computer and Communications Security, pp. 62-73. ACM Press, New York (1993)
    • (1993) Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols. In: FOCS
    • Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS. pp. 136-145. IEEE Computer Society. Los Alamitos (2001)
    • (2001) IEEE Computer Society , pp. 136-145
    • Canetti, R.1
  • 8
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHl, pp. 581-590. ACM Press, New York (2006)
    • Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHl, pp. 581-590. ACM Press, New York (2006)
  • 9
    • 57049113251 scopus 로고    scopus 로고
    • Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally composable security analysis of tls - secure sessions with handshake and record layer protocols. Cryptology ePrint Archive, Report 2008/251 (2008)
    • Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally composable security analysis of tls - secure sessions with handshake and record layer protocols. Cryptology ePrint Archive, Report 2008/251 (2008)
  • 10
    • 77952417644 scopus 로고    scopus 로고
    • Gajek, S., Manulis, M., Sadeghi, A.-R., Schwenk, J.: Provably secure browser-based user-aware mutual authentication over tls. In: ASIACCS, pp. 300-311. ACM Press, New York (2008)
    • Gajek, S., Manulis, M., Sadeghi, A.-R., Schwenk, J.: Provably secure browser-based user-aware mutual authentication over tls. In: ASIACCS, pp. 300-311. ACM Press, New York (2008)
  • 11
    • 56949108849 scopus 로고    scopus 로고
    • Gajek, S., Schwenk, J., Xuan, C.: On the insecurity of microsoft's identity metasystem cardspace (HGI TR-2008-004) (2008)
    • Gajek, S., Schwenk, J., Xuan, C.: On the insecurity of microsoft's identity metasystem cardspace (HGI TR-2008-004) (2008)
  • 12
    • 84944734046 scopus 로고    scopus 로고
    • Security analysis of the SAML single sign-on browser/artifact profile
    • IEEE Computer Society, Los Alamitos
    • Groß, T.: Security analysis of the SAML single sign-on browser/artifact profile. In: Annual Computer Security Applications Conference. IEEE Computer Society, Los Alamitos (2003)
    • (2003) Annual Computer Security Applications Conference
    • Groß, T.1
  • 13
    • 57049128801 scopus 로고    scopus 로고
    • Groß, T., Pfitzmann, B.: Sami artifact information flow revisited. Research Report RZ 3643 (99653), IBM Research (2006)
    • Groß, T., Pfitzmann, B.: Sami artifact information flow revisited. Research Report RZ 3643 (99653), IBM Research (2006)
  • 14
    • 57049186670 scopus 로고    scopus 로고
    • Security proofs for the RSA-PSS signature scheme and its variants. Cryptology ePrint Archive
    • Report 2001/053
    • Jonsson, J.: Security proofs for the RSA-PSS signature scheme and its variants. Cryptology ePrint Archive. Report 2001/053 (2001)
    • (2001)
    • Jonsson, J.1
  • 15
    • 77952370957 scopus 로고    scopus 로고
    • Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
    • Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58-71. ACM, New York (2007)
  • 17
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the Passport single sign-on protocol
    • Kormann, D., Rubin, A.: Risks of the Passport single sign-on protocol. Computer Networks 33(1-6), 51-58 (2000)
    • (2000) Computer Networks , vol.33 , Issue.1-6 , pp. 51-58
    • Kormann, D.1    Rubin, A.2
  • 18
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 19
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Security and Privacy, pp. 184-200 (2001)
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 20
    • 1142301938 scopus 로고    scopus 로고
    • Analysis of liberty single-signon with enabled clients
    • Pfitzmann, B., Waidner, M.: Analysis of liberty single-signon with enabled clients. IEEE Internet Computing 7(6), 38-44 (2003)
    • (2003) IEEE Internet Computing , vol.7 , Issue.6 , pp. 38-44
    • Pfitzmann, B.1    Waidner, M.2
  • 21
    • 1642489925 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Shoup, V.: OAEP reconsidered, J. Cryptology 15(4), 223-249 (2002)
    • (2002) J. Cryptology , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.