The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for kerberos with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1994 (18) 1995-1997 (19) 1998-1999 (17) 2000-2001 (21) 2002-2003 (19) 2004-2005 (29) 2006 (31) 2007 (19) 2008 (17) 2009-2010 (19) 2011 (22) 2012-2013 (20) 2014-2016 (19) 2017-2019 (16) 2020-2023 (14)
Publication types (Num. hits)
article(110) book(1) incollection(8) inproceedings(179) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 181 occurrences of 126 keywords

Results
Found 300 publication records. Showing 300 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
129Phillip L. Hellewell, Kent E. Seamons Extensible Pre-authentication Kerberos. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
109Saber Zrelli, Yoichi Shinoda Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
102Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk A Browser-Based Kerberos Authentication Scheme. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
96Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509
96Patrick C. Moore, Wilbur R. Johnson, Richard J. Detry Adapting globus and kerberos for a secure ASCI grid. Search on Bibsonomy SC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ASCI, GSSAPI, security, grid, globus, kerberos
88Alexandra Boldyreva, Virendra Kumar Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
83Alan Harbitter, Daniel A. Menascé The performance of public key-enabled kerberos authentication in mobile computing applications. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos
75Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad Breaking and Fixing Public-Key Kerberos. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
69Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay Computationally sound mechanized proofs for basic and public-key Kerberos. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PKINIT, key usability, computational model, automatic verification, Kerberos
69Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL
61Kai Fan 0001, Hui Li 0006, Yue Wang 0043 Security Analysis of the Kerberos Protocol Using BAN Logic. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. Search on Bibsonomy RIVF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad Specifying Kerberos 5 cross-realm authentication. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males A Kerberos-Based Authentication Architecture for Wireless LANs. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Rong Chen, Yadong Gui, Ji Gao Modification on Kerberos Authentication Protocol in Grid Computing Environment. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov A Formal Analysis of Some Properties of Kerberos 5 Using MSR. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
61John T. Kohl The use of Encryption in Kerberos for Network Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
54Seung Wook Jung, Souhwan Jung Secure Password Authentication for Distributed Computing. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Alan Harbitter, Daniel A. Menascé A methodology for analyzing the performance of authentication protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos
49Bert Valenzuela Is a modern, robust Windows XP lab environment better than an older, simpler Windows NT4 environment? Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AFS, Arizona State University, PC-Rdist, Windows NT4, default user profile, group policy, kix32, lab configuration, logon time, mandatory profile, site configuration, system policy, script, Windows, build, kerberos, lab management, active directory, Windows 2000, Windows XP
49Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
47Yongjian Li, Jun Pang 0001 Extending the Strand Space Method to Verify Kerberos V. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47John-Paul Robinson, Jill B. Gemmill, Pravin Joshi, Purushotham V. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao Web-enabled grid authentication in a non-Kerberos environment. Search on Bibsonomy GRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov Verifying Confidentiality and Authentication in Kerberos 5. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki Applying Kerberos to the Communication Environment for Information Appliances. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Cheolhyun Kim, Yeijin Lee, Ilyong Chung The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Alan Harbitter, Daniel A. Menascé Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Nabih T. Abdelmajid, M. Alamgir Hossain, S. Shepherd, Khaled W. Mahmoud Improved Kerberos Security Protocol Evaluation using Modified BAN Logic. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Kerberos Protocol, Global Position System, BAN Logic
42Piyush Kumar Shukla, G. S. Mishra, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RC-5, TGS, Kerberos, Client, AS
41Giovanni Di Crescenzo, Olga Kornievskaia Efficient Kerberized Multicast in a Practical Distributed Setting. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authentication, Performance Analysis, Key Distribution, Hybrid Encryption
35Jungkyu Kwon, Mokdong Chung RFID-Based ALE Application Framework Using Context-Based Security Service. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAUT, Simple Heuristics, Context-awareness, RFID, Kerberos, ALE
35Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell Secure Smart Homes using Jini and UIUC SESAME. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices
35Naomaru Itoi, Peter Honeyman Practical Security Systems with Smartcards. Search on Bibsonomy Workshop on Hot Topics in Operating Systems The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, operating systems, Internet Protocol (IP), Smartcard, Kerberos, filesystem
35John C. Mitchell, Mark Mitchell, Ulrich Stern Automated analysis of cryptographic protocols using Mur-phi. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cryptographic protocol analysis, Mur/spl phi/, general-purpose state enumeration tool, security-related protocols, faulty TMN protocol, replay attack detection, cryptography, methodology, errors, client server system, network operating system, computation time, Kerberos
35Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
34Jose M. Such, Juan M. Alberola, Ana García-Fornes, Agustín Espinosa, Vicente J. Botti Kerberos-Based Secure Multiagent Platform. Search on Bibsonomy ProMAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera Extracting Kerberos passwords through RC4-HMAC encryption type analysis. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Giampaolo Bella, Lawrence C. Paulson Mechanising BAN Kerberos by the Inductive Method. Search on Bibsonomy CAV The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Giampaolo Bella, Lawrence C. Paulson Kerberos Version 4: Inductive Analysis of the Secrecy Goals. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF secure key, non-expired timestamp, inductive method, machine proof, secrecy
27Shengli Liu 0003, Wenbing Wang, Yuefei Zhu A New-Style Domain Integrating Management of Windows and UNIX. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Arnab Roy 0001, Anupam Datta, John C. Mitchell Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Johann Großschädl, Alexander Szekely, Stefan Tillich The energy cost of cryptographic key establishment in wireless sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy evaluation, wireless networking, cryptography, security protocols, key establishment
27Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert Secrecy Analysis in Protocol Composition Logic. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Lee-Sub Lee, KyungSun Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon An Inter-Domain Authentication Mechanism for XMPP/Jabber. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine Reducing the Dependence of SPKI/SDSI on PKI. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Lin Chen 0020, Xiaoqin Huang, Jinyuan You Certificate-Based Authentication and Authorization Architecture in Digital Library. Search on Bibsonomy ICADL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Heba Kamal Aslan AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Kyung-Ah Chang, Do-Gun Jung, Byung-Rae Lee, Tai-Yun Kim CORBA-Based Fair Contracts Support System for Subjects of Electronic Commerce. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Paul Ashley, Mark Vandenwauver, Bradley Broom A Uniform Approach to Securing Unix Applications Using SESAME. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Wenbo Mao, Colin Boyd On Strengthening Authentication Protocols to Foil Cryptanalysis. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek Secure Bindings of SAML Assertions to TLS Sessions. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Authentication, Single-Sign-On, SSL, SAML, TLS, Kerberos, Federated Identity Management
22Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores A System for Distributed SELinux Policy Management. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access, distributed, control, policies, administration, Kerberos, SELinux
22Eisaku Sakane, Manabu Higashida, Shingo Okamura, Toyokazu Akiyama, Ken-ichi Baba, Shinji Shimojo, Yuuichi Teranishi An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NAREGI, Authentication, Grid middleware, Kerberos
22Laurianne McLaughlin, Barton C. Massey In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity metasystem, InfoCard, Security Assertion Markup Language, Sxip Identity, Liberty Alliance, GOSCON, security, Internet, IT, open source, government, SAML, Kerberos, X.509
22Alessandro Basile, Stefano Conti, Fabio Galliano, Fred Daneshgaran, Marina Mondin, Massimiliano Laddomada An end-to-end simulator for an open broadband access network. Search on Bibsonomy MOBIWAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Kerberos Ticket, OBAN, OPNET, EAP, CARD
22Joseph W. Graham II Authenticating public access networking. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory
22Bert Valenzuela A work of art: creating a site/classroom build from scratch. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Arizona State University, Kix32, PC-Rdist, SID, default user profile, group policy, lab configuration, logon time, mandatory profile, site configuration, script, Windows, procedure, build, kerberos, lab management
22Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala Security in Distributed Digital Libraries: Issues and Challenges . Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI)
22Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park Password-Authenticated Key Exchange between Clients with Different Passwords. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key exchange, Password authentication, dictionary attack, Kerberos, cross-realm
20Jiahui Chen, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan, Michele Ianni, Antonella Guzzo, Giancarlo Fortino DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Shiv Kumar Tiwari, Subhrendu Guha Neogi Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Md Mehedi Hasan, Noor Afiza Mohd Ariffin, Nor Fazlida Mohd Sani Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure. Search on Bibsonomy J. Intell. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Thomas Grippo, Hisham A. Kholidy Detecting Forged Kerberos Tickets in an Active Directory Environment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. Search on Bibsonomy CANDARW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Jörg Schwenk, Douglas Stebila A reduction-based proof for authentication and session key security in three-party Kerberos. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Ran Li, Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh Verification of RabbitMQ with Kerberos Using Timed Automata. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. S. Sendhil Kumar Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20P. Thirumoorthy, K. S. Bhuvaneshwari, C. Kamalanathan, Sunita Panda, E. Prabhu, S. Maheswaran 0001 Improved Key Agreement Based Kerberos Protocol for M-Health Security. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Grela Ajvazi, Festim Halili SOAP messaging to provide quality of protection through Kerberos Authentication. Search on Bibsonomy IWSSIP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Carlos Díaz Motero, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, Nadia Gámez Gómez On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Jerome H. Saltzer On the Origin of Kerberos. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Benjula Anbu Malar Manickam Bernard, Prabhu Jayagopal Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack. Search on Bibsonomy Int. J. Pervasive Comput. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Yuanyuan Yang, Hui Li 0022, Xiangdong Cheng, Xin Yang 0019, Yaoguang Huo A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service. Search on Bibsonomy UEMCON The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Love Hörnquist-Åstrand, Larry Zhu, Margaret Cullen, Greg Hudson Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility. Search on Bibsonomy RFC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Jörg Schwenk, Douglas Stebila A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
20Guangyao Yuan, Lihong Guo, Gang Wang Security Analysis and Improvement on Kerberos Authentication Protocol. Search on Bibsonomy ICBDS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Fadi Al-Ayed, Chunqiang Hu, Hang Liu 0003 An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
20Hui Li 0027, Yi Niu, Junkai Yi, Hongyu Li Securing Offline Delivery Services by Using Kerberos Authentication. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Benjamin Kaduk, Michiko Short Deprecate Triple-DES (3DES) and RC4 in Kerberos. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Linna Fan, Xiaofeng Song, Weiwei Zhao, Haodan Ran, Jingzhi Li, Deyang Shi, Suining Mu, Tao Qi An anonymous authentication mechanism based on Kerberos and HIBC. Search on Bibsonomy ICETC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Ritika Yaduvanshi, Shivendu Mishra, Ashish Kumar Mishra 0001, Avinash Gupta A Security Framework for Service-Oriented Architecture Based on Kerberos. Search on Bibsonomy CICBA (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz A New Mutuel Kerberos Authentication Protocol for Distributed Systems. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
20Thi Ai Thao Nguyen, Tran Khanh Dang Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol. Search on Bibsonomy Trans. Large Scale Data Knowl. Centered Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Juan Alejandro Ibáñez Ramírez, Francisco de Asís López-Fuentes Autenticación para acceso a datos distribuidos basado en Kerberos. Search on Bibsonomy Res. Comput. Sci. The full citation details ... 2017 DBLP  BibTeX  RDF
20L. Manunza, S. Marseglia, Simon Pietro Romano Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Larry Zhu, Paul J. Leach, Sam Hartman, Shawn Emery Anonymity Support for Kerberos. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Anupam Jain, Nathan Kinder, Nathaniel McCallum Authentication Indicator in Kerberos Tickets. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Michiko Short, Seth Moore, Paul Miller Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Kamil Dimililer, Yoney Kirsal Ever, Fulden Ergun A preliminary framework using bpnn for performability modelling and analyses of a kerberos server. Search on Bibsonomy ICACCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Song-Ho Pak, Myong-Suk Pak, Chung-Hyok Jang A method to Implement the Kerberos User Authentication and the secured Internet Service. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
20Simo Sorce, Tom Yu Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs). Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin AES Encryption with HMAC-SHA2 for Kerberos 5. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Shawn Emery, Nicolas Williams A Pseudo-Random Function (PRF) for the Kerberos V Generic Security Service Application Program Interface (GSS-API) Mechanism. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Jörg Schwenk Nonce-based Kerberos is a Secure Delegated AKE Protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
20Hella Kaffel-Ben Ayed, Bilel Zaghdoudi A generic Kerberos-based access control system for the cloud. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Toshinori Araki, Assaf Barak, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Joseph Carrigan, Paul D. Martin 0002, Michael Rushanan KBID: Kerberos Bracelet Identification (Short Paper). Search on Bibsonomy Financial Cryptography The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 300 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license