Kerberos

Known as: Windows 2000 security, Kerberized, Kerberos-protocols 
Kerberos /ˈkərbərɒs/ is a computer network authentication protocol that works on the basis of 'tickets' to allow nodes communicating over a non… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2018
0204019882018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2006
2006
We report on the detailed verification of a substantial portion of the Kerberos 5 protocol specification. Because it targeted a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This document describes protocol extensions (hereafter called PKINIT) to the Kerberos protocol specification. These extensions… (More)
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control… (More)
  • figure 3.2
  • table 3.3
  • table 3.5
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
An operational model of crypto-protocols is tailored to the detailed analysis of the secrecy goals accomplished by Kerberos… (More)
  • figure 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it… (More)
  • figure 2
Is this relevant?
Review
1993
Review
1993
This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
The Kerberos authentication system, a part of MIT's Project Athena, has been adopted by other organizations. Despite Kerberos's… (More)
  • table 1
Is this relevant?
Review
1988
Review
1988
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services… (More)
  • figure 3
  • figure 2
  • figure 5
  • figure 6
  • figure 9
Is this relevant?