-
1
-
-
3042537645
-
Formal analysis of the Kerberos authentication system
-
G. Bella, and E. Riccobene, "Formal analysis of the Kerberos authentication system," Journal of Universal Computer Science, vol. 3, no. 12, pp. 1337-1381, 1997.
-
(1997)
Journal of Universal Computer Science
, vol.3
, Issue.12
, pp. 1337-1381
-
-
Bella, G.1
Riccobene, E.2
-
2
-
-
22444455879
-
Kerberos version IV: In-ductive analysis of the secrecy goals
-
Springer-Verlag
-
G. Bella, and L. Paulson, "Kerberos version IV: In-ductive analysis of the secrecy goals," ESORICS '98, Springer-Verlag, 1998.
-
(1998)
ESORICS '98
-
-
Bella, G.1
Paulson, L.2
-
3
-
-
0000874415
-
Limitations of the Ker-beros authentication system
-
S. Bellovin, and M. Merrit, "Limitations of the Ker-beros authentication system," SIGCOMM Computer Communication Review, vol. 20, no. 5, pp. 119-132, 1990.
-
(1990)
SIGCOMM Computer Communication Review
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.1
Merrit, M.2
-
6
-
-
80054059390
-
A formal analysis of some properties of Ker-beros 5 using MSR
-
F. Butler, I. Cervesato, A. D. Jaggard, and A. Sce-drov, "A formal analysis of some properties of Ker-beros 5 using MSR," IEEE CSFW '02, pp. 1-16, 2002.
-
(2002)
IEEE CSFW '02
, pp. 1-16
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Sce-drov, A.4
-
7
-
-
0842267605
-
High-speed ECC based Kerberos authentication protocol for wireless applications
-
Dec
-
M. Erdem, "High-speed ECC based Kerberos authentication protocol for wireless applications," IEEE Global Telecommunications Conference (GLOBECOM), vol. 3, pp. 1440-1444, Dec. 2003.
-
(2003)
IEEE Global Telecommunications Conference (GLOBECOM)
, vol.3
, pp. 1440-1444
-
-
Erdem, M.1
-
9
-
-
80054087355
-
-
Kerberos Consortium MIT
-
MIT Kerberos Consortium, "The Kerberos web-page," (http://www.Kerberos.org/index.html)
-
The Kerberos web-page
-
-
-
10
-
-
84983293158
-
The use of encryption in Kerberos for network authentication
-
Springer-Verlag
-
J. Kohl, "The use of encryption in Kerberos for network authentication," Crypto' 89, pp. 35-43, Springer-Verlag, 1989.
-
(1989)
Crypto'89
, pp. 35-43
-
-
Kohl, J.1
-
12
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, pp. 993-999, Dec. 1978.
-
(1978)
Communications of the ACM
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
13
-
-
0028514601
-
Kerberos: An authentica-tion service for computer networks
-
Sep
-
C. Neuman and T. Ts'o, "Kerberos: An authentica-tion service for computer networks," IEEE Commu-nications Magazine, pp. 33-38, Sep. 1994.
-
(1994)
IEEE Commu-nications Magazine
, pp. 33-38
-
-
Neuman, C.1
Ts'o, T.2
-
14
-
-
28144446331
-
-
Network Working Group, RFC 4120
-
C. Neuman, T. Yu, S. Hartman, and K. Raeburn, The Kerberos Network Authentication Service (V5), Network Working Group, RFC 4120, 2005. (http://www.ietf.org/rfc/rfc4120.txt)
-
(2005)
The Kerberos Network Authentication Service (V5)
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
22
-
-
77958058561
-
-
Wikipedia, (protocol))
-
Wikipedia, "Kerberos (protocol)," (http://en.wikipedia.org/wiki/Kerberos (protocol))
-
Kerberos (protocol)
-
-
-
23
-
-
85180736317
-
A real-world analysis of Kerberos pass-word security
-
The Internet Society
-
T. D. Wu, "A real-world analysis of Kerberos pass-word security," NDSS '99, The Internet Society, 1999.
-
(1999)
NDSS '99
-
-
Wu, T.D.1
-
24
-
-
80054061921
-
"The perils of unauthenticated encryp-tion: Kerberos Version 4," NDSS '04
-
T. Yu et al., "The perils of unauthenticated encryp-tion: Kerberos Version 4," NDSS '04, The Internet Society, 2004.
-
(2004)
The Internet Society
-
-
Yu, T.1
|