The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Kerberos with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1994 (18) 1995-1997 (19) 1998-1999 (17) 2000-2001 (21) 2002-2003 (19) 2004-2005 (29) 2006 (31) 2007 (19) 2008 (17) 2009-2010 (19) 2011 (22) 2012-2013 (20) 2014-2016 (19) 2017-2019 (16) 2020-2023 (14)
Publication types (Num. hits)
article(110) book(1) incollection(8) inproceedings(179) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 181 occurrences of 126 keywords

Results
Found 300 publication records. Showing 300 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Jonathan T. Trostle, Irina Kosinovsky, Michael M. Swift Implementation of Crossrealm Referral Handling in the MIT Kerberos Client. Search on Bibsonomy NDSS The full citation details ... 2001 DBLP  BibTeX  RDF
20Assar Westerlund, Johan Danielsson Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together. Search on Bibsonomy USENIX Annual Technical Conference, FREENIX Track The full citation details ... 2001 DBLP  BibTeX  RDF
20Theodore Y. Ts'o Telnet Authentication: Kerberos Version 5. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Naomaru Itoi Secure Coprocessor Integration with Kerberos V5. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2000 DBLP  BibTeX  RDF
20Kirsten Hildrum Security of Encrypted rlogin Connections Created With Kerberos IV. Search on Bibsonomy NDSS The full citation details ... 2000 DBLP  BibTeX  RDF
20Paul B. Hill Kerberos Interoperability Issues. Search on Bibsonomy LISA-NT The full citation details ... 2000 DBLP  BibTeX  RDF
20Ari Medvinsky, Matthew Hur Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). Search on Bibsonomy RFC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Mike Eisler NFS Version 2 and Version 3 Security Issues and the NFS Protocol's Use of RPCSEC_GSS and Kerberos V5. Search on Bibsonomy RFC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Thomas D. Wu A Real-World Analysis of Kerberos Password Security. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
20Naomaru Itoi, Peter Honeyman Smartcard Integration with Kerberos V5. Search on Bibsonomy Smartcard The full citation details ... 1999 DBLP  BibTeX  RDF
20Glenn Pittaway Distributed security services in microsoft Windows NT 5.0 - Kerberos and the active directory. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Peter Brundrett Kerberos authentication in Windows NT 5.0 domains. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Johan Danielsson, Assar Westerlund Heimdal: I18N Free Kerberos Implementation. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 1998 DBLP  BibTeX  RDF
20Giampaolo Bella, Elvinia Riccobene Formal Analysis of the Kerberos Authentication System. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Bryn Dole, Steven W. Lodin, Eugene H. Spafford Misplaced Trust: Kerberos 4 Session Keys. Search on Bibsonomy NDSS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Marvin A. Sirbu, John C.-I. Chuang Distributed Authentication in Kerberos Using Public Key Cryptography. Search on Bibsonomy NDSS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan Performance analysis of the Kerberos protocol in a distributed environment. Search on Bibsonomy ISCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Donald T. Davis, Daniel E. Geer Jr. Kerberos with Clocks Adrift: History, Protocols, and Implementation. Search on Bibsonomy Comput. Syst. The full citation details ... 1996 DBLP  BibTeX  RDF
20John Linn The Kerberos Version 5 GSS-API Mechanism. Search on Bibsonomy RFC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Armando Fox, Steven D. Gribble Security on the Move: Indirect Authentication using Kerberos. Search on Bibsonomy MobiCom The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Internet
20Don Davis Kerberos Plus RSA for World Wide Web Security. Search on Bibsonomy USENIX Workshop on Electronic Commerce The full citation details ... 1995 DBLP  BibTeX  RDF
20William A. Adamson, Jim Rees, Peter Honeyman Joining Security Realms: A Single Login for NetWare and Kerberos. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1995 DBLP  BibTeX  RDF
20Don Davis, Daniel E. Geer Jr. Kerberos Security with Clocks Adrift. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1995 DBLP  BibTeX  RDF
20Ravi Ganesan Yaksha: augmenting Kerberos with public key cryptography. Search on Bibsonomy NDSS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20P. V. McMahon SESAME V2 public key and authorisation extensions to Kerberos. Search on Bibsonomy NDSS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Jeffrey I. Schiller, Derek R. Atkins Scaling the Web of Trust: Combining Kerberos and PGP to Provide Large Scale Authentication. Search on Bibsonomy USENIX Winter The full citation details ... 1995 DBLP  BibTeX  RDF
20Ray Kaplan, Joe Kovara, Glen Zorn Planning and Implementing Kerberos for Large Distributed Systems Part 1. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20Ray Kaplan, Glen Zorn, Joe Kovara Planning and Implementing Kerberos for Large Distributed Systems: Part 2. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20B. Clifford Neuman, Theodore Y. Ts'o Kerberos: an authentication service for computer networks. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20John T. Kohl, B. Clifford Neuman The Kerberos Network Authentication Service (V5). Search on Bibsonomy RFC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20David A. Borman Telnet Authentication: Kerberos Version 4. Search on Bibsonomy RFC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Bart De Decker Unix Security & Kerberos. Search on Bibsonomy Computer Security and Industrial Cryptography The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Steven M. Bellovin, Michael Merritt Limitations of the Kerberos Authentication System. Search on Bibsonomy USENIX Winter The full citation details ... 1991 DBLP  BibTeX  RDF
20Denis Russell High-Level Security Architectures and the Kerberos System. Search on Bibsonomy Comput. Networks ISDN Syst. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
20Steven M. Bellovin, Michael Merritt Limitations of the Kerberos authentication system. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
20Jennifer G. Steiner, B. Clifford Neuman, Jeffrey I. Schiller Kerberos: An Authentication Service for Open Network Systems. Search on Bibsonomy USENIX Winter The full citation details ... 1988 DBLP  BibTeX  RDF
14Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt Implementation of a Trusted Ticket System. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Béla Genge, Piroska Haller Towards Automated Secure Web Service Execution. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF automated execution, ontology, Web services, Security protocols
14Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari Distributed authentication for services commercialization in ad hoc networks. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication access controls, services commercialization using ad hoc networks, ad hoc networks
14Ji Ma 0001, Mehmet A. Orgun Formalising theories of trust for authentication protocols. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trust theory, Agents, Authentication protocols, Belief logic
14Ti Zhou, Zhoujun Li 0001, Mengjun Li, Huowang Chen Constraint Abstraction in Verification of Security Protocols. Search on Bibsonomy FAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time sensitive, formal verification, security protocol, logic model, constraint system
14Liu Peng, Zong Rui, Liu Sizuo A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Alexandros Papanikolaou, Christos Ilioudis, Christos K. Georgiadis, Elias Pimenidis The importance of biometric sensor continuous secure monitoring. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Iliano Cervesato, Catherine Meadows 0001 One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF C.2.0.f Network-level security and protection, C.2.2.c Protocol verification, F.4.3 Formal Languages
14Ji Ma 0001, Mehmet A. Orgun Specifying Agent Beliefs for Authentication Systems. Search on Bibsonomy ECUMN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Peter Csaba Ölveczky, Martin Grimeland Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Gizela Jakubowska, Wojciech Penczek Is Your Security Protocol on Time ? Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Robin Sharp, Michael R. Hansen Timed Traces and Strand Spaces. Search on Bibsonomy CSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF verification, real-time, Security protocols, interval logic
14Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell Inductive Proofs of Computational Secrecy. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Chris Desmarais, Xiaojun Shen, Shervin Shirmohammadi, Alex Cameron, Nicolas D. Georganas, Ian Kerr PLUTO - A Privacy Control Protocol for e-Commerce Communities. Search on Bibsonomy CEC/EEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Heesun Park, Stan Redford Client certificate and IP address based multi-factor authentication for J2EE web applications. Search on Bibsonomy CASCON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP address checking, J2EE web application, SSL client certificate, certificate based authentication, multi-factor authentication
14Benjamin W. Long, Colin J. Fidge Formally Analysing a Security Protocol for Replay Attacks. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Dominik Zalewski Security Enhancement of Java Remote Method Invocation. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Saber Zrelli, Yoichi Shinoda Single sign-on framework for AAA operations within commercial mobile networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Roberto Zunino, Pierpaolo Degano Handling exp, × (and Timestamps) in Protocol Analysis. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yuping Deng, Xiaowei Guo, Xiamu Niu A New Design Scheme of Role-Based Access Control Based on PKI. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jongpil Jeong, Min Young Chung, Hyunseung Choo Secure User Authentication Mechanism in Digital Home Network Environments. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Terry Fleury, Jim Basney, Von Welch Single sign-on for java web start applications using myproxy. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF session passwords, single sign-on, grid portals
14Khanh V. Nguyen Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Michel Abdalla, David Pointcheval Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authentication, multi-party protocols, Diffie-Hellman assumptions
14Tuomas Aura, Michael Roe, Anish Mohammed Experiences with Host-to-Host IPsec. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications
14David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam CredEx: User-Centric Credential Management for Grid and Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Christian Schläger, Günther Pernul Authentication and Authorisation Infrastructures in b2c e-Commerce. Search on Bibsonomy EC-Web The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin Safe Authentication Method for Security Communication in Ubiquitous. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Xiangguo Li, Jianhua Yang, Zhaohui Wu 0001 An NFSv4-Based Security Scheme for NAS. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Federico D. Sacerdoti, Mason J. Katz, Philip M. Papadopoulos 411 on scalable password service. Search on Bibsonomy HPDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Shuanghe Peng, Zhen Han Proxy Cryptography for Secure Inter-domain Information Exchanges. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Bruce Christianson Anonymous Authentication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Pasi Eronen, Jari Arkko Authentication Components: Engineering Experiences and Guidelines. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Yu Enokibori, Nobuhiko Nishio Realizing a Secure Federation of Multi-institutional Service Systems. Search on Bibsonomy UCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ali M. Allam 0001, Ibraliim I. Ibrahim, Ihab A. Ali, Abdel-Rahman H. El-Sawy Provably secure entity authentication the three party case. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Chang-Joo Moon, Dae-Ha Park A User Authentication Model for the OSGi Service Platform. Search on Bibsonomy AsiaSim The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Joengmin Hwang, Yongdae Kim Revisiting random key pre-distribution schemes for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wireless sensor networks, key pre-distribution
14Alexander Prosser, Robert Kofler, Robert Krimmer Deploying Electronic Democracy for Public Corporations. Search on Bibsonomy EGOV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kokate, Mohamed F. Younis A Low-Energy Key Management Protocol for Wireless Sensor Networks. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14George Lawton Open Source Security: Opportunity or Oxymoron? Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Ohad Rodeh, Kenneth P. Birman, Danny Dolev The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, Group communication
14W. Garrett Mitchener, Amin Vahdat A chat room assignment for teaching network security. Search on Bibsonomy SIGCSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim Authentication Service Model Supporting Multiple Domains in Distributed Computing. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim Flexible Authentication with Multiple Domains of Electronic Commerce. Search on Bibsonomy EC-Web The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Stelvio Cimato Design of an Authentication Protocol for Gsm Javacards. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Javacard, E-commerce and M- commerce security, Authentication protocol
14Kyung-Ah Chang, Tae-Seung Lee, Bang-Hung Chun, Tai-Yun Kim Ticket-Based Secure Delegation Service Supporting Multiple Domain Models. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano Making Sense of Specifications: The Formalization of SET. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Frank Stajano The Resurrecting Duckling - What Next? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Naomaru Itoi, Tomoko Fukuzawa, Peter Honeyman Secure Internet Smartcards. Search on Bibsonomy Java Card Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Judy I. Beiriger, Wilbur R. Johnson, Hugh P. Bivens, Steven L. Humphreys, Ronald Rhea Constructing the ASCI Computational Grid. Search on Bibsonomy HPDC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Bruce Schneier Cryptography: The Importance of Not Being Different. Search on Bibsonomy Computer The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman Mixed Strand Spaces. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Paul Ashley, Bradley Broom, Mark Vandenwauver An Implementation of a Secure Version of NFS Including RBAC. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Vipin Samar Single Sign-On Using Cookies for Web Applications. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Keok Auyong, Chye-Lin Chee Authentication Services For Computer Networks And Electronic Messaging Systems. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Marc Mehdi Ayadi, Dominique Bolignano Verification of Cryptographic Protocols: An Experiment. Search on Bibsonomy FME The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, formal methods, cryptographic protocols, Coq
14Johann Schumann Automatic Verification of Cryptographic Protocols with SETHEO. Search on Bibsonomy CADE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 Beacon Based Authentication. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol
14Thomas Hardjono, Jennifer Seberry Authentication via Multi-Service Tickets in the Kuperee Server. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
14Armin Liebl Authentication in Distributed Systems: A Bibliography. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14A. Kehne, Jürgen Schönwälder, Horst Langendörfer A Nonce-Based Protocol For Multiple Authentications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
14Li Gong A Security Risk of Depending on Synchronized Clocks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
14Patrick Horster, Hans-Joachim Knobloch Discrete Logarithm Based Protocols. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 300 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license