Kerberos: an authentication service for computer networks

@article{Neuman1994KerberosAA,
  title={Kerberos: an authentication service for computer networks},
  author={B. C. Neuman and Theodore Y. Ts'o},
  journal={IEEE Communications Magazine},
  year={1994},
  volume={32},
  pages={33-38}
}
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can… Expand
IAuth: An authentication system for Internet applications
  • Suan-Suan Chew, K.L. Ng, C. Chee
  • Computer Science
  • Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)
  • 1997
Kerberos Active Directory for HP Thin Clients
ENHANCED KERBEROS AUTHENTICATION FOR DISTRIBUTED ENVIRONMENT
Security management in Kerberos V5 for GSM network
  • M. Jaiganesh, B. Ramdoss
  • Computer Science
  • 2008 International Conference on Computing, Communication and Networking
  • 2008
A new pre-authentication protocol in Kerberos 5: biometric authentication
  • Hoa Quoc Le, H. P. Truong, H. Van, T. Le
  • Computer Science
  • The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF)
  • 2015
Performance analysis of the Kerberos protocol in a distributed environment
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 16 REFERENCES
Internet Privacy Enhanced Mail
Proxy-based authorization and accounting for distributed systems
  • B. C. Neuman
  • Computer Science
  • [1993] Proceedings. The 13th International Conference on Distributed Computing Systems
  • 1993
Toward a national public key infrastructure
  • S. Chokhani
  • Computer Science
  • IEEE Communications Magazine
  • 1994
Timestamps in key distribution protocols
...
1
2
...