메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal

(2)  Kirsal, Y a   Gemikonakli, O a  

a NONE

Author keywords

CASPER; Kerberos; Key Renewal; Network Security; Timed Authentication Protocols

Indexed keywords

CASPER; INSECURE NETWORKS; KERBEROS; KEY RENEWAL; NETWORK AUTHENTICATIONS; SESSION KEYS; TIMED-AUTHENTICATION PROTOCOLS;

EID: 64949183947     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UKRICIS.2008.4798930     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 2
    • 0011716691 scopus 로고
    • Limitations of the Kerberos Authentication System
    • S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication System". USENIX winter 1991, pp.253-268. 1991.
    • (1991) USENIX winter 1991 , pp. 253-268
    • Bellovin, S.M.1    Merritt, M.2
  • 3
    • 64949177095 scopus 로고    scopus 로고
    • Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities
    • Las Vegas, Nevada, April, ISBN: 0-9772107-2-3
    • A. H. Eneh., O. Gemikonakli and R. Comley, "Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities", The Fifth Security Conference 2006, Las Vegas, Nevada, April 2006, ISBN: 0-9772107-2-3.
    • (2006) The Fifth Security Conference
    • Eneh, A.H.1    Gemikonakli, O.2    Comley, R.3
  • 4
  • 6
    • 64949142984 scopus 로고    scopus 로고
    • A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks
    • Liverpool UK, pp
    • Y. Kirsal, A. Eneh and O. Gemikonakli, "A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks", PGNET2005, Liverpool UK, pp.333-339, 2005.
    • (2005) PGNET2005 , pp. 333-339
    • Kirsal, Y.1    Eneh, A.2    Gemikonakli, O.3
  • 9
    • 64949143630 scopus 로고    scopus 로고
    • Further Improvements to the Kerberos Timed Autentication Protocol
    • Y.Kirsal and O.Gemikonakli, "Further Improvements to the Kerberos Timed Autentication Protocol", CISSE 2007, 2007.
    • (2007) CISSE 2007
    • Kirsal, Y.1    Gemikonakli, O.2
  • 10
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-key Authentication Protocol
    • G. Lowe, "An Attack on the Needham-Schroeder Public-key Authentication Protocol." Information Processing Letters. vol: 56(3), pp. 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 13
    • 0013046241 scopus 로고    scopus 로고
    • An Initial Security Analysis of the IEEE 802.1X Standard
    • UMIACS-TR, February
    • A. Mishra and W. A. Arbaugh, "An Initial Security Analysis of the IEEE 802.1X Standard", White paper, UMIACS-TR-2002-10, February 2002.
    • (2010) White paper , pp. 2002
    • Mishra, A.1    Arbaugh, W.A.2
  • 14
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • M. R. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers." Communication ACM (21) pp.993-999, 1978.
    • (1978) Communication ACM , vol.21 , pp. 993-999
    • Needham, M.R.1    Schroeder, M.D.2
  • 17
    • 84878241495 scopus 로고    scopus 로고
    • Available:, Accessed: 27 April 2005, Last Accessed: 13 September 2007
    • "Security White Paper Evolution, Requirements, and Options" Available: http://wifiplanet.com/tutorials/articles.php/965471 [Accessed: 27 April 2005] [Last Accessed: 13 September 2007].
    • Security White Paper Evolution, Requirements, and Options


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.