-
2
-
-
0011716691
-
Limitations of the Kerberos Authentication System
-
S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication System". USENIX winter 1991, pp.253-268. 1991.
-
(1991)
USENIX winter 1991
, pp. 253-268
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
64949177095
-
Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities
-
Las Vegas, Nevada, April, ISBN: 0-9772107-2-3
-
A. H. Eneh., O. Gemikonakli and R. Comley, "Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities", The Fifth Security Conference 2006, Las Vegas, Nevada, April 2006, ISBN: 0-9772107-2-3.
-
(2006)
The Fifth Security Conference
-
-
Eneh, A.H.1
Gemikonakli, O.2
Comley, R.3
-
6
-
-
64949142984
-
A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks
-
Liverpool UK, pp
-
Y. Kirsal, A. Eneh and O. Gemikonakli, "A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks", PGNET2005, Liverpool UK, pp.333-339, 2005.
-
(2005)
PGNET2005
, pp. 333-339
-
-
Kirsal, Y.1
Eneh, A.2
Gemikonakli, O.3
-
8
-
-
84878545351
-
Frequent Key Renewal under Pseudo- Secure Conditions for Increased Security in Kerberos Authentication and Its Impact On System Performability
-
UK
-
Y. Kirsal and O. Gemikonakli, "Frequent Key Renewal under Pseudo- Secure Conditions for Increased Security in Kerberos Authentication and Its Impact On System Performability", 3rd International Conference on Global E-Security, University of East London (UeL), Docklands, UK, 2007.
-
(2007)
3rd International Conference on Global E-Security, University of East London (UeL), Docklands
-
-
Kirsal, Y.1
Gemikonakli, O.2
-
9
-
-
64949143630
-
Further Improvements to the Kerberos Timed Autentication Protocol
-
Y.Kirsal and O.Gemikonakli, "Further Improvements to the Kerberos Timed Autentication Protocol", CISSE 2007, 2007.
-
(2007)
CISSE 2007
-
-
Kirsal, Y.1
Gemikonakli, O.2
-
10
-
-
28144456308
-
An Attack on the Needham-Schroeder Public-key Authentication Protocol
-
G. Lowe, "An Attack on the Needham-Schroeder Public-key Authentication Protocol." Information Processing Letters. vol: 56(3), pp. 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
13
-
-
0013046241
-
An Initial Security Analysis of the IEEE 802.1X Standard
-
UMIACS-TR, February
-
A. Mishra and W. A. Arbaugh, "An Initial Security Analysis of the IEEE 802.1X Standard", White paper, UMIACS-TR-2002-10, February 2002.
-
(2010)
White paper
, pp. 2002
-
-
Mishra, A.1
Arbaugh, W.A.2
-
14
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
M. R. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers." Communication ACM (21) pp.993-999, 1978.
-
(1978)
Communication ACM
, vol.21
, pp. 993-999
-
-
Needham, M.R.1
Schroeder, M.D.2
-
17
-
-
84878241495
-
-
Available:, Accessed: 27 April 2005, Last Accessed: 13 September 2007
-
"Security White Paper Evolution, Requirements, and Options" Available: http://wifiplanet.com/tutorials/articles.php/965471 [Accessed: 27 April 2005] [Last Accessed: 13 September 2007].
-
Security White Paper Evolution, Requirements, and Options
-
-
|