메뉴 건너뛰기




Volumn , Issue , 2011, Pages 83-87

Security analysis of authentication protocols for next-generation mobile and CE cloud services

Author keywords

authentication protocol; mobile home network services; mutual authentication; phishing; single sign on; trusted third party; two factor authentication; zero knowledge proof

Indexed keywords

AUTHENTICATION PROTOCOLS; HOME NETWORK SERVICES; MUTUAL AUTHENTICATION; PHISHING; SINGLE SIGN ON; TRUSTED THIRD PARTIES; TWO FACTOR AUTHENTICATION; ZERO KNOWLEDGE PROOF;

EID: 80054816611     PISSN: 0747668X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCE-Berlin.2011.6031855     Document Type: Conference Paper
Times cited : (42)

References (23)
  • 2
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. In IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 4
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, vol. 21, no. 12, pages 993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 5
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. SIGCOMM Comput. Commun. Rev., vol. 20, no. 5, pages 119-132, 1990.
    • (1990) SIGCOMM Comput. Commun. Rev. , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 0033605501 scopus 로고    scopus 로고
    • Inter-protocol interleaving attacks on some authentication and key distribution protocols
    • T. Wen-Guey and H. Chi-Ming. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters, vol. 69, no. 6, pages 297-302, 1999.
    • (1999) Information Processing Letters , vol.69 , Issue.6 , pp. 297-302
    • Wen-Guey, T.1    Chi-Ming, H.2
  • 12
    • 80054826453 scopus 로고    scopus 로고
    • SeDiCi: An authentication service taking advantage of zero-knowledge proofs
    • Springer
    • S. Grzonkowski. SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. In Financial Cryptography. Springer, 2010
    • (2010) Financial Cryptography
    • Grzonkowski, S.1
  • 14
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 15 January
    • S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing" in Journal of Network and Computer Applications, Vol. 34, no. 1. (15 January 2011), pp. 1-11.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 19
    • 79952440250 scopus 로고    scopus 로고
    • Architectural requirements for cloud computing systems: An enterprise cloud approach
    • March
    • B. P., Rimal, A., Jukan, D., Katsaros and Y. Goeleven, Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach, Journal of Grid Computing, Volume 9, Number 1, (March 2011) pp. 3-26.
    • (2011) Journal of Grid Computing , vol.9 , Issue.1 , pp. 3-26
    • Rimal, B.P.1    Jukan, A.2    Katsaros, D.3    Goeleven, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.