The performance of public key-enabled kerberos authentication in mobile computing applications

@inproceedings{Harbitter2001ThePO,
  title={The performance of public key-enabled kerberos authentication in mobile computing applications},
  author={Alan Harbitter and Daniel A. Menasc{\'e}},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2001}
}
Authenticating mobile computing users can require a significant amount of processing and communications resources-particularly when protocols based on public key encryption are invoked. These resource requirements can result in unacceptable response times for the user. In this paper, we analyze adaptations of the public key-enabled Kerberos network authentication protocol to a mobile platform by measuring the service time of a "skeleton" implementation and constructing a closed queuing network… CONTINUE READING
Highly Cited
This paper has 65 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 38 extracted citations

pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices

21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) • 2007
View 5 Excerpts
Highly Influenced

Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications • 2014
View 4 Excerpts
Highly Influenced

A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications • 2013
View 3 Excerpts

A Privacy Preserving Application Acquisition Protocol

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications • 2012
View 3 Excerpts

Information and Communications Security

Lecture Notes in Computer Science • 2012

Cross-Platform Application Sharing Mechanism

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications • 2011
View 3 Excerpts

66 Citations

051015'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 66 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…