|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 181 occurrences of 126 keywords
|
|
|
Results
Found 300 publication records. Showing 300 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
129 | Phillip L. Hellewell, Kent E. Seamons |
Extensible Pre-authentication Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 201-210, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
109 | Saber Zrelli, Yoichi Shinoda |
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 490-497, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
102 | Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk |
A Browser-Based Kerberos Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 115-129, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
96 | Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris |
Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 28, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509 |
96 | Patrick C. Moore, Wilbur R. Johnson, Richard J. Detry |
Adapting globus and kerberos for a secure ASCI grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the 2001 ACM/IEEE conference on Supercomputing, Denver, CO, USA, November 10-16, 2001, CD-ROM, pp. 21, 2001, ACM, 1-58113-293-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ASCI, GSSAPI, security, grid, globus, kerberos |
88 | Alexandra Boldyreva, Virendra Kumar |
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 92-100, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Alan Harbitter, Daniel A. Menascé |
The performance of public key-enabled kerberos authentication in mobile computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 78-85, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos |
75 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad |
Breaking and Fixing Public-Key Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 167-181, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
69 | Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Computationally sound mechanized proofs for basic and public-key Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 87-99, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKINIT, key usability, computational model, automatic verification, Kerberos |
69 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 575-580, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
61 | Kai Fan 0001, Hui Li 0006, Yue Wang 0043 |
Security Analysis of the Kerberos Protocol Using BAN Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 467-470, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni |
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIVF ![In: 2007 IEEE International Conference on Research, Innovation and Vision for the Future in Computing & Communication Technologies, RIVF 2007, Hanoi, Vietnam, 5-9 March 2007, pp. 211-219, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad |
Specifying Kerberos 5 cross-realm authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 12-26, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1344-1353, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Rong Chen, Yadong Gui, Ji Gao |
Modification on Kerberos Authentication Protocol in Grid Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 1079-1082, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov |
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 175-, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
61 | John T. Kohl |
The use of Encryption in Kerberos for Network Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 35-43, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
54 | Seung Wook Jung, Souhwan Jung |
Secure Password Authentication for Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 491-501, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Alan Harbitter, Daniel A. Menascé |
A methodology for analyzing the performance of authentication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 458-491, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, Authentication, performance modeling, public key cryptography, proxy servers, Kerberos |
49 | Bert Valenzuela |
Is a modern, robust Windows XP lab environment better than an older, simpler Windows NT4 environment? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 294-297, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
AFS, Arizona State University, PC-Rdist, Windows NT4, default user profile, group policy, kix32, lab configuration, logon time, mandatory profile, site configuration, system policy, script, Windows, build, kerberos, lab management, active directory, Windows 2000, Windows XP |
49 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 89-103, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
47 | Yongjian Li, Jun Pang 0001 |
Extending the Strand Space Method to Verify Kerberos V. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 3-6 December 2007, Adelaide, Australia, pp. 437-444, 2007, IEEE Computer Society, 0-7695-3049-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 362-383, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | John-Paul Robinson, Jill B. Gemmill, Pravin Joshi, Purushotham V. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao |
Web-enabled grid authentication in a non-Kerberos environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 318-322, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov |
Verifying Confidentiality and Authentication in Kerberos 5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 1-24, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki |
Applying Kerberos to the Communication Environment for Information Appliances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 214-217, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Cheolhyun Kim, Yeijin Lee, Ilyong Chung |
The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 972-979, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Alan Harbitter, Daniel A. Menascé |
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 170-183, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Nabih T. Abdelmajid, M. Alamgir Hossain, S. Shepherd, Khaled W. Mahmoud |
Improved Kerberos Security Protocol Evaluation using Modified BAN Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1610-1615, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Kerberos Protocol, Global Position System, BAN Logic |
42 | Piyush Kumar Shukla, G. S. Mishra, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor |
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 1581-1582, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RC-5, TGS, Kerberos, Client, AS |
41 | Giovanni Di Crescenzo, Olga Kornievskaia |
Efficient Kerberized Multicast in a Practical Distributed Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 27-45, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pp. 16-22, 1999, IEEE Computer Society, 0-7695-0250-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
35 | Jungkyu Kwon, Mokdong Chung |
RFID-Based ALE Application Framework Using Context-Based Security Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 1042-1051, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MAUT, Simple Heuristics, Context-awareness, RFID, Kerberos, ALE |
35 | Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
Secure Smart Homes using Jini and UIUC SESAME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 77-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices |
35 | Naomaru Itoi, Peter Honeyman |
Practical Security Systems with Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Hot Topics in Operating Systems ![In: Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, HotOS-VII, Rio Rico, Arizona, USA, March 28-30, 1999, pp. 185-190, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, operating systems, Internet Protocol (IP), Smartcard, Kerberos, filesystem |
35 | John C. Mitchell, Mark Mitchell, Ulrich Stern |
Automated analysis of cryptographic protocols using Mur-phi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 141-151, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
cryptographic protocol analysis, Mur/spl phi/, general-purpose state enumeration tool, security-related protocols, faulty TMN protocol, replay attack detection, cryptography, methodology, errors, client server system, network operating system, computation time, Kerberos |
35 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 105-116, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
34 | Jose M. Such, Juan M. Alberola, Ana García-Fornes, Agustín Espinosa, Vicente J. Botti |
Kerberos-Based Secure Multiagent Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProMAS ![In: Programming Multi-Agent Systems, 6th International Workshop, ProMAS 2008, Estoril, Portugal, May 13, 2008. Revised Invited and Selected Papers, pp. 197-210, 2008, Springer, 978-3-642-03277-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 679-685, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton |
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 389-400, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Giampaolo Bella, Lawrence C. Paulson |
Mechanising BAN Kerberos by the Inductive Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 10th International Conference, CAV '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings, pp. 416-427, 1998, Springer, 3-540-64608-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Giampaolo Bella, Lawrence C. Paulson |
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 361-375, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
secure key, non-expired timestamp, inductive method, machine proof, secrecy |
27 | Shengli Liu 0003, Wenbing Wang, Yuefei Zhu |
A New-Style Domain Integrating Management of Windows and UNIX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 619-624, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Arnab Roy 0001, Anupam Datta, John C. Mitchell |
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 312-329, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Johann Großschädl, Alexander Szekely, Stefan Tillich |
The energy cost of cryptographic key establishment in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 380-382, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
energy evaluation, wireless networking, cryptography, security protocols, key establishment |
27 | Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert |
Secrecy Analysis in Protocol Composition Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 197-213, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lee-Sub Lee, KyungSun Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon |
An Inter-Domain Authentication Mechanism for XMPP/Jabber. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Fourth International Conference on Software Engineering, Research, Management and Applications (SERA 2006), 9-11 August 2006, Seattle, Washington, USA, pp. 268-275, 2006, IEEE Computer Society, 0-7695-2656-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 156-173, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: International Collaboration and Cross-Fertilization, 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 13-17, 2004, Proceedings, pp. 643, 2004, Springer, 3-540-24030-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Heba Kamal Aslan |
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 14-26, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Kyung-Ah Chang, Do-Gun Jung, Byung-Rae Lee, Tai-Yun Kim |
CORBA-Based Fair Contracts Support System for Subjects of Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 462-467, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Paul Ashley, Mark Vandenwauver, Bradley Broom |
A Uniform Approach to Securing Unix Applications Using SESAME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 24-35, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 193-204, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek |
Secure Bindings of SAML Assertions to TLS Sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 62-69, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Authentication, Single-Sign-On, SSL, SAML, TLS, Kerberos, Federated Identity Management |
22 | Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
A System for Distributed SELinux Policy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 254-261, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access, distributed, control, policies, administration, Kerberos, SELinux |
22 | Eisaku Sakane, Manabu Higashida, Shingo Okamura, Toyokazu Akiyama, Ken-ichi Baba, Shinji Shimojo, Yuuichi Teranishi |
An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 277-280, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NAREGI, Authentication, Grid middleware, Kerberos |
22 | Laurianne McLaughlin, Barton C. Massey |
In the News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(1), pp. 108-113, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity metasystem, InfoCard, Security Assertion Markup Language, Sxip Identity, Liberty Alliance, GOSCON, security, Internet, IT, open source, government, SAML, Kerberos, X.509 |
22 | Alessandro Basile, Stefano Conti, Fabio Galliano, Fred Daneshgaran, Marina Mondin, Massimiliano Laddomada |
An end-to-end simulator for an open broadband access network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBIWAC ![In: Proceedings of the Forth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2006, Terromolinos, Spain, October 2, 2006, pp. 135-138, 2006, ACM, 1-59593-488-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Kerberos Ticket, OBAN, OPNET, EAP, CARD |
22 | Joseph W. Graham II |
Authenticating public access networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 247-248, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
22 | Bert Valenzuela |
A work of art: creating a site/classroom build from scratch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 206-209, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Arizona State University, Kix32, PC-Rdist, SID, default user profile, group policy, lab configuration, logon time, mandatory profile, site configuration, script, Windows, procedure, build, kerberos, lab management |
22 | Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala |
Security in Distributed Digital Libraries: Issues and Challenges . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 480-486, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI) |
22 | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park |
Password-Authenticated Key Exchange between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 134-146, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key exchange, Password authentication, dictionary attack, Kerberos, cross-realm |
20 | Jiahui Chen, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan, Michele Ianni, Antonella Guzzo, Giancarlo Fortino |
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 23, pp. 100871, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Shiv Kumar Tiwari, Subhrendu Guha Neogi |
Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(5), pp. 430, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Md Mehedi Hasan, Noor Afiza Mohd Ariffin, Nor Fazlida Mohd Sani |
Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Syst. ![In: J. Intell. Syst. 32(1), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Grippo, Hisham A. Kholidy |
Detecting Forged Kerberos Tickets in an Active Directory Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.00044, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami |
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDARW ![In: Eleventh International Symposium on Computing and Networking, CANDAR 2023 - Workshops, Matsue, Japan, November 27-30, 2023, pp. 260-266, 2023, IEEE, 979-8-3503-0694-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk, Douglas Stebila |
A reduction-based proof for authentication and session key security in three-party Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 4(2), pp. 61-84, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ran Li, Jiaqi Yin, Huibiao Zhu, Phan Cong Vinh |
Verification of RabbitMQ with Kerberos Using Timed Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 27(5), pp. 2049-2067, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. S. Sendhil Kumar |
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 43(2), pp. 833-847, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | P. Thirumoorthy, K. S. Bhuvaneshwari, C. Kamalanathan, Sunita Panda, E. Prabhu, S. Maheswaran 0001 |
Improved Key Agreement Based Kerberos Protocol for M-Health Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 42(2), pp. 577-587, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Grela Ajvazi, Festim Halili |
SOAP messaging to provide quality of protection through Kerberos Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSSIP ![In: 29th International Conference on Systems, Signals and Image Processing, IWSSIP 2022, Sofia, Bulgaria, June 1-3, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-9578-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Carlos Díaz Motero, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, Nadia Gámez Gómez |
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 109289-109319, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Jerome H. Saltzer |
On the Origin of Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 43(1), pp. 89-91, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Benjula Anbu Malar Manickam Bernard, Prabhu Jayagopal |
Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Pervasive Comput. Commun. ![In: Int. J. Pervasive Comput. Commun. 17(1), pp. 78-88, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yuanyuan Yang, Hui Li 0022, Xiangdong Cheng, Xin Yang 0019, Yaoguang Huo |
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2020, New York City, NY, USA, October 28-31, 2020, pp. 176-182, 2020, IEEE, 978-1-7281-9656-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Love Hörnquist-Åstrand, Larry Zhu, Margaret Cullen, Greg Hudson |
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8636, pp. 1-21, July 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk, Douglas Stebila |
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 777, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Guangyao Yuan, Lihong Guo, Gang Wang |
Security Analysis and Improvement on Kerberos Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBDS ![In: Big Data and Security - First International Conference, ICBDS 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers, pp. 199-210, 2019, Springer, 978-981-15-7529-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Fadi Al-Ayed, Chunqiang Hu, Hang Liu 0003 |
An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 20(4), pp. 655-663, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Hui Li 0027, Yi Niu, Junkai Yi, Hongyu Li |
Securing Offline Delivery Services by Using Kerberos Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 40735-40746, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Benjamin Kaduk, Michiko Short |
Deprecate Triple-DES (3DES) and RC4 in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8429, pp. 1-10, October 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Linna Fan, Xiaofeng Song, Weiwei Zhao, Haodan Ran, Jingzhi Li, Deyang Shi, Suining Mu, Tao Qi |
An anonymous authentication mechanism based on Kerberos and HIBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETC ![In: Proceedings of the 10th International Conference on Education Technology and Computers, ICETC 2018, Tokyo, Japan, October 26-28, 2018, pp. 392-396, 2018, ACM, 978-1-4503-6517-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ritika Yaduvanshi, Shivendu Mishra, Ashish Kumar Mishra 0001, Avinash Gupta |
A Security Framework for Service-Oriented Architecture Based on Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICBA (2) ![In: Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II, pp. 402-410, 2018, Springer, 978-981-13-8580-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz |
A New Mutuel Kerberos Authentication Protocol for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(6), pp. 889-898, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | Thi Ai Thao Nguyen, Tran Khanh Dang |
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Large Scale Data Knowl. Centered Syst. ![In: Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI - Special Issue on Data and Security Engineering, pp. 47-66, 2017, Springer, 978-3-662-54172-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Juan Alejandro Ibáñez Ramírez, Francisco de Asís López-Fuentes |
Autenticación para acceso a datos distribuidos basado en Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Res. Comput. Sci. ![In: Res. Comput. Sci. 142, pp. 69-78, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | L. Manunza, S. Marseglia, Simon Pietro Romano |
Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 80, pp. 22-34, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Larry Zhu, Paul J. Leach, Sam Hartman, Shawn Emery |
Anonymity Support for Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8062, pp. 1-18, February 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Anupam Jain, Nathan Kinder, Nathaniel McCallum |
Authentication Indicator in Kerberos Tickets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8129, pp. 1-6, March 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Michiko Short, Seth Moore, Paul Miller |
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Freshness Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8070, pp. 1-9, February 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Kamil Dimililer, Yoney Kirsal Ever, Fulden Ergun |
A preliminary framework using bpnn for performability modelling and analyses of a kerberos server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, Udupi (Near Mangalore), India, September 13-16, 2017, pp. 698-700, 2017, IEEE, 978-1-5090-6367-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Song-Ho Pak, Myong-Suk Pak, Chung-Hyok Jang |
A method to Implement the Kerberos User Authentication and the secured Internet Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1604.08799, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
20 | Simo Sorce, Tom Yu |
Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7751, pp. 1-10, March 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin |
AES Encryption with HMAC-SHA2 for Kerberos 5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8009, pp. 1-19, October 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Shawn Emery, Nicolas Williams |
A Pseudo-Random Function (PRF) for the Kerberos V Generic Security Service Application Program Interface (GSS-API) Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7802, pp. 1-8, March 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Schwenk |
Nonce-based Kerberos is a Secure Delegated AKE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 219, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
20 | Hella Kaffel-Ben Ayed, Bilel Zaghdoudi |
A generic Kerberos-based access control system for the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 71(9-10), pp. 555-567, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Toshinori Araki, Assaf Barak, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1841-1843, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Carrigan, Paul D. Martin 0002, Michael Rushanan |
KBID: Kerberos Bracelet Identification (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, pp. 544-551, 2016, Springer, 978-3-662-54969-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 300 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|