|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 181 occurrences of 126 keywords
|
|
|
Results
Found 300 publication records. Showing 300 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
129 | Phillip L. Hellewell, Kent E. Seamons |
Extensible Pre-authentication Kerberos. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
109 | Saber Zrelli, Yoichi Shinoda |
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
102 | Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk |
A Browser-Based Kerberos Authentication Scheme. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
96 | Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris |
Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509 |
96 | Patrick C. Moore, Wilbur R. Johnson, Richard J. Detry |
Adapting globus and kerberos for a secure ASCI grid. |
SC |
2001 |
DBLP DOI BibTeX RDF |
ASCI, GSSAPI, security, grid, globus, kerberos |
88 | Alexandra Boldyreva, Virendra Kumar |
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Alan Harbitter, Daniel A. Menascé |
The performance of public key-enabled kerberos authentication in mobile computing applications. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos |
75 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad |
Breaking and Fixing Public-Key Kerberos. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Computationally sound mechanized proofs for basic and public-key Kerberos. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
PKINIT, key usability, computational model, automatic verification, Kerberos |
69 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
61 | Kai Fan 0001, Hui Li 0006, Yue Wang 0043 |
Security Analysis of the Kerberos Protocol Using BAN Logic. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni |
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. |
RIVF |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad |
Specifying Kerberos 5 cross-realm authentication. |
WITS |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Rong Chen, Yadong Gui, Ji Gao |
Modification on Kerberos Authentication Protocol in Grid Computing Environment. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov |
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
61 | John T. Kohl |
The use of Encryption in Kerberos for Network Authentication. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
54 | Seung Wook Jung, Souhwan Jung |
Secure Password Authentication for Distributed Computing. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Alan Harbitter, Daniel A. Menascé |
A methodology for analyzing the performance of authentication protocols. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos |
49 | Bert Valenzuela |
Is a modern, robust Windows XP lab environment better than an older, simpler Windows NT4 environment? |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
AFS, Arizona State University, PC-Rdist, Windows NT4, default user profile, group policy, kix32, lab configuration, logon time, mandatory profile, site configuration, system policy, script, Windows, build, kerberos, lab management, active directory, Windows 2000, Windows XP |
49 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
47 | Yongjian Li, Jun Pang 0001 |
Extending the Strand Space Method to Verify Kerberos V. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
47 | John-Paul Robinson, Jill B. Gemmill, Pravin Joshi, Purushotham V. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao |
Web-enabled grid authentication in a non-Kerberos environment. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov |
Verifying Confidentiality and Authentication in Kerberos 5. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki |
Applying Kerberos to the Communication Environment for Information Appliances. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Cheolhyun Kim, Yeijin Lee, Ilyong Chung |
The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Alan Harbitter, Daniel A. Menascé |
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Nabih T. Abdelmajid, M. Alamgir Hossain, S. Shepherd, Khaled W. Mahmoud |
Improved Kerberos Security Protocol Evaluation using Modified BAN Logic. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Kerberos Protocol, Global Position System, BAN Logic |
42 | Piyush Kumar Shukla, G. S. Mishra, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor |
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
RC-5, TGS, Kerberos, Client, AS |
41 | Giovanni Di Crescenzo, Olga Kornievskaia |
Efficient Kerberized Multicast in a Practical Distributed Setting. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
35 | Jungkyu Kwon, Mokdong Chung |
RFID-Based ALE Application Framework Using Context-Based Security Service. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
MAUT, Simple Heuristics, Context-awareness, RFID, Kerberos, ALE |
35 | Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
Secure Smart Homes using Jini and UIUC SESAME. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices |
35 | Naomaru Itoi, Peter Honeyman |
Practical Security Systems with Smartcards. |
Workshop on Hot Topics in Operating Systems |
1999 |
DBLP DOI BibTeX RDF |
security, operating systems, Internet Protocol (IP), Smartcard, Kerberos, filesystem |
35 | John C. Mitchell, Mark Mitchell, Ulrich Stern |
Automated analysis of cryptographic protocols using Mur-phi. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
cryptographic protocol analysis, Mur/spl phi/, general-purpose state enumeration tool, security-related protocols, faulty TMN protocol, replay attack detection, cryptography, methodology, errors, client server system, network operating system, computation time, Kerberos |
35 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
34 | Jose M. Such, Juan M. Alberola, Ana García-Fornes, Agustín Espinosa, Vicente J. Botti |
Kerberos-Based Secure Multiagent Platform. |
ProMAS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton |
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Giampaolo Bella, Lawrence C. Paulson |
Mechanising BAN Kerberos by the Inductive Method. |
CAV |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Giampaolo Bella, Lawrence C. Paulson |
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
secure key, non-expired timestamp, inductive method, machine proof, secrecy |
27 | Shengli Liu 0003, Wenbing Wang, Yuefei Zhu |
A New-Style Domain Integrating Management of Windows and UNIX. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Arnab Roy 0001, Anupam Datta, John C. Mitchell |
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Johann Großschädl, Alexander Szekely, Stefan Tillich |
The energy cost of cryptographic key establishment in wireless sensor networks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
energy evaluation, wireless networking, cryptography, security protocols, key establishment |
27 | Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert |
Secrecy Analysis in Protocol Composition Logic. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lee-Sub Lee, KyungSun Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon |
An Inter-Domain Authentication Mechanism for XMPP/Jabber. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. |
ICADL |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Heba Kamal Aslan |
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Kyung-Ah Chang, Do-Gun Jung, Byung-Rae Lee, Tai-Yun Kim |
CORBA-Based Fair Contracts Support System for Subjects of Electronic Commerce. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Paul Ashley, Mark Vandenwauver, Bradley Broom |
A Uniform Approach to Securing Unix Applications Using SESAME. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek |
Secure Bindings of SAML Assertions to TLS Sessions. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Authentication, Single-Sign-On, SSL, SAML, TLS, Kerberos, Federated Identity Management |
22 | Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
A System for Distributed SELinux Policy Management. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Access, distributed, control, policies, administration, Kerberos, SELinux |
22 | Eisaku Sakane, Manabu Higashida, Shingo Okamura, Toyokazu Akiyama, Ken-ichi Baba, Shinji Shimojo, Yuuichi Teranishi |
An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
NAREGI, Authentication, Grid middleware, Kerberos |
22 | Laurianne McLaughlin, Barton C. Massey |
In the News. |
IEEE Softw. |
2006 |
DBLP DOI BibTeX RDF |
identity metasystem, InfoCard, Security Assertion Markup Language, Sxip Identity, Liberty Alliance, GOSCON, security, Internet, IT, open source, government, SAML, Kerberos, X.509 |
22 | Alessandro Basile, Stefano Conti, Fabio Galliano, Fred Daneshgaran, Marina Mondin, Massimiliano Laddomada |
An end-to-end simulator for an open broadband access network. |
MOBIWAC |
2006 |
DBLP DOI BibTeX RDF |
Kerberos Ticket, OBAN, OPNET, EAP, CARD |
22 | Joseph W. Graham II |
Authenticating public access networking. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
22 | Bert Valenzuela |
A work of art: creating a site/classroom build from scratch. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
Arizona State University, Kix32, PC-Rdist, SID, default user profile, group policy, lab configuration, logon time, mandatory profile, site configuration, script, Windows, procedure, build, kerberos, lab management |
22 | Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala |
Security in Distributed Digital Libraries: Issues and Challenges . |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI) |
22 | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park |
Password-Authenticated Key Exchange between Clients with Different Passwords. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
key exchange, Password authentication, dictionary attack, Kerberos, cross-realm |
20 | Jiahui Chen, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan, Michele Ianni, Antonella Guzzo, Giancarlo Fortino |
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Shiv Kumar Tiwari, Subhrendu Guha Neogi |
Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos. |
SN Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Md Mehedi Hasan, Noor Afiza Mohd Ariffin, Nor Fazlida Mohd Sani |
Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure. |
J. Intell. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Grippo, Hisham A. Kholidy |
Detecting Forged Kerberos Tickets in an Active Directory Environment. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami |
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. |
CANDARW |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk, Douglas Stebila |
A reduction-based proof for authentication and session key security in three-party Kerberos. |
Int. J. Appl. Cryptogr. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ran Li, Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh |
Verification of RabbitMQ with Kerberos Using Timed Automata. |
Mob. Networks Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. S. Sendhil Kumar |
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health. |
Comput. Syst. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | P. Thirumoorthy, K. S. Bhuvaneshwari, C. Kamalanathan, Sunita Panda, E. Prabhu, S. Maheswaran 0001 |
Improved Key Agreement Based Kerberos Protocol for M-Health Security. |
Comput. Syst. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Grela Ajvazi, Festim Halili |
SOAP messaging to provide quality of protection through Kerberos Authentication. |
IWSSIP |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Carlos Díaz Motero, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, Nadia Gámez Gómez |
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Jerome H. Saltzer |
On the Origin of Kerberos. |
IEEE Ann. Hist. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Benjula Anbu Malar Manickam Bernard, Prabhu Jayagopal |
Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack. |
Int. J. Pervasive Comput. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yuanyuan Yang, Hui Li 0022, Xiangdong Cheng, Xin Yang 0019, Yaoguang Huo |
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service. |
UEMCON |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Love Hörnquist-Åstrand, Larry Zhu, Margaret Cullen, Greg Hudson |
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility. |
RFC |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk, Douglas Stebila |
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
20 | Guangyao Yuan, Lihong Guo, Gang Wang |
Security Analysis and Improvement on Kerberos Authentication Protocol. |
ICBDS |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Fadi Al-Ayed, Chunqiang Hu, Hang Liu 0003 |
An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. |
Int. J. Netw. Secur. |
2018 |
DBLP BibTeX RDF |
|
20 | Hui Li 0027, Yi Niu, Junkai Yi, Hongyu Li |
Securing Offline Delivery Services by Using Kerberos Authentication. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Benjamin Kaduk, Michiko Short |
Deprecate Triple-DES (3DES) and RC4 in Kerberos. |
RFC |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Linna Fan, Xiaofeng Song, Weiwei Zhao, Haodan Ran, Jingzhi Li, Deyang Shi, Suining Mu, Tao Qi |
An anonymous authentication mechanism based on Kerberos and HIBC. |
ICETC |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ritika Yaduvanshi, Shivendu Mishra, Ashish Kumar Mishra 0001, Avinash Gupta |
A Security Framework for Service-Oriented Architecture Based on Kerberos. |
CICBA (2) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz |
A New Mutuel Kerberos Authentication Protocol for Distributed Systems. |
Int. J. Netw. Secur. |
2017 |
DBLP BibTeX RDF |
|
20 | Thi Ai Thao Nguyen, Tran Khanh Dang |
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol. |
Trans. Large Scale Data Knowl. Centered Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Juan Alejandro Ibáñez Ramírez, Francisco de Asís López-Fuentes |
Autenticación para acceso a datos distribuidos basado en Kerberos. |
Res. Comput. Sci. |
2017 |
DBLP BibTeX RDF |
|
20 | L. Manunza, S. Marseglia, Simon Pietro Romano |
Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. |
J. Netw. Comput. Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Larry Zhu, Paul J. Leach, Sam Hartman, Shawn Emery |
Anonymity Support for Kerberos. |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Anupam Jain, Nathan Kinder, Nathaniel McCallum |
Authentication Indicator in Kerberos Tickets. |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Michiko Short, Seth Moore, Paul Miller |
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension. |
RFC |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Kamil Dimililer, Yoney Kirsal Ever, Fulden Ergun |
A preliminary framework using bpnn for performability modelling and analyses of a kerberos server. |
ICACCI |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Song-Ho Pak, Myong-Suk Pak, Chung-Hyok Jang |
A method to Implement the Kerberos User Authentication and the secured Internet Service. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
20 | Simo Sorce, Tom Yu |
Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs). |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin |
AES Encryption with HMAC-SHA2 for Kerberos 5. |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Shawn Emery, Nicolas Williams |
A Pseudo-Random Function (PRF) for the Kerberos V Generic Security Service Application Program Interface (GSS-API) Mechanism. |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk |
Nonce-based Kerberos is a Secure Delegated AKE Protocol. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
20 | Hella Kaffel-Ben Ayed, Bilel Zaghdoudi |
A generic Kerberos-based access control system for the cloud. |
Ann. des Télécommunications |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Toshinori Araki, Assaf Barak, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Carrigan, Paul D. Martin 0002, Michael Rushanan |
KBID: Kerberos Bracelet Identification (Short Paper). |
Financial Cryptography |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 300 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|