메뉴 건너뛰기




Volumn 12, Issue 3, 2011, Pages 159-170

An authentication protocol based on kerberos 5

Author keywords

Access control; Au thorization; Authentication protocols; Computer network security; Kerberos

Indexed keywords

AU-THORIZATION; AUTHENTICATION PROTOCOLS; DISTRIBUTION CENTERS; KERBEROS; KERBEROS AUTHENTICATION; KERBEROS PROTOCOL; PASSWORD GUESSING ATTACK; RANDOM NUMBERS;

EID: 80054060630     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (11)

References (24)
  • 1
    • 3042537645 scopus 로고    scopus 로고
    • Formal analysis of the Kerberos authentication system
    • G. Bella, and E. Riccobene, "Formal analysis of the Kerberos authentication system," Journal of Universal Computer Science, vol. 3, no. 12, pp. 1337-1381, 1997.
    • (1997) Journal of Universal Computer Science , vol.3 , Issue.12 , pp. 1337-1381
    • Bella, G.1    Riccobene, E.2
  • 2
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: In-ductive analysis of the secrecy goals
    • Springer-Verlag
    • G. Bella, and L. Paulson, "Kerberos version IV: In-ductive analysis of the secrecy goals," ESORICS '98, Springer-Verlag, 1998.
    • (1998) ESORICS '98
    • Bella, G.1    Paulson, L.2
  • 3
    • 0000874415 scopus 로고
    • Limitations of the Ker-beros authentication system
    • S. Bellovin, and M. Merrit, "Limitations of the Ker-beros authentication system," SIGCOMM Computer Communication Review, vol. 20, no. 5, pp. 119-132, 1990.
    • (1990) SIGCOMM Computer Communication Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.1    Merrit, M.2
  • 6
    • 80054059390 scopus 로고    scopus 로고
    • A formal analysis of some properties of Ker-beros 5 using MSR
    • F. Butler, I. Cervesato, A. D. Jaggard, and A. Sce-drov, "A formal analysis of some properties of Ker-beros 5 using MSR," IEEE CSFW '02, pp. 1-16, 2002.
    • (2002) IEEE CSFW '02 , pp. 1-16
    • Butler, F.1    Cervesato, I.2    Jaggard, A.D.3    Sce-drov, A.4
  • 7
    • 0842267605 scopus 로고    scopus 로고
    • High-speed ECC based Kerberos authentication protocol for wireless applications
    • Dec
    • M. Erdem, "High-speed ECC based Kerberos authentication protocol for wireless applications," IEEE Global Telecommunications Conference (GLOBECOM), vol. 3, pp. 1440-1444, Dec. 2003.
    • (2003) IEEE Global Telecommunications Conference (GLOBECOM) , vol.3 , pp. 1440-1444
    • Erdem, M.1
  • 9
    • 80054087355 scopus 로고    scopus 로고
    • Kerberos Consortium MIT
    • MIT Kerberos Consortium, "The Kerberos web-page," (http://www.Kerberos.org/index.html)
    • The Kerberos web-page
  • 10
    • 84983293158 scopus 로고
    • The use of encryption in Kerberos for network authentication
    • Springer-Verlag
    • J. Kohl, "The use of encryption in Kerberos for network authentication," Crypto' 89, pp. 35-43, Springer-Verlag, 1989.
    • (1989) Crypto'89 , pp. 35-43
    • Kohl, J.1
  • 12
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec
    • R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, pp. 993-999, Dec. 1978.
    • (1978) Communications of the ACM , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 13
    • 0028514601 scopus 로고
    • Kerberos: An authentica-tion service for computer networks
    • Sep
    • C. Neuman and T. Ts'o, "Kerberos: An authentica-tion service for computer networks," IEEE Commu-nications Magazine, pp. 33-38, Sep. 1994.
    • (1994) IEEE Commu-nications Magazine , pp. 33-38
    • Neuman, C.1    Ts'o, T.2
  • 22
    • 77958058561 scopus 로고    scopus 로고
    • Wikipedia, (protocol))
    • Wikipedia, "Kerberos (protocol)," (http://en.wikipedia.org/wiki/Kerberos (protocol))
    • Kerberos (protocol)
  • 23
    • 85180736317 scopus 로고    scopus 로고
    • A real-world analysis of Kerberos pass-word security
    • The Internet Society
    • T. D. Wu, "A real-world analysis of Kerberos pass-word security," NDSS '99, The Internet Society, 1999.
    • (1999) NDSS '99
    • Wu, T.D.1
  • 24
    • 80054061921 scopus 로고    scopus 로고
    • "The perils of unauthenticated encryp-tion: Kerberos Version 4," NDSS '04
    • T. Yu et al., "The perils of unauthenticated encryp-tion: Kerberos Version 4," NDSS '04, The Internet Society, 2004.
    • (2004) The Internet Society
    • Yu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.