Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,488 papers from all fields of science
Search
Sign In
Create Free Account
Kerberos
Known as:
Windows 2000 security
, Kerberized
, Kerberos-protocols
Expand
Kerberos /ˈkərbərɒs/ is a computer network authentication protocol that works on the basis of 'tickets' to allow nodes communicating over a non…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
389 Directory Server
56-bit encryption
Access token
Apple Open Directory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Effect of initial droplet shape on the tangential force required for spreading and sliding along a solid surface
I. Ríos-López
,
S. Evgenidis
,
M. Kostoglou
,
Xenophon Zabulis
,
T. Karapantsios
Colloids and Surfaces A: Physicochemical and…
2018
Corpus ID: 53978060
2016
2016
One time pad generation using quantum superposition states
Gaurav Upadhyay
,
M. Nene
IEEE International Conference on Recent Trends in…
2016
Corpus ID: 16783062
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any…
Expand
2007
2007
Practical and Universal Interpretation Functions for Secrecy
H. Houmani
,
M. Mejri
International Conference on Security and…
2007
Corpus ID: 35797483
Using the notion of interpretation functions, this paper gives some sufficient and practical conditions allowing to guarantee the…
Expand
2006
2006
Trust Negotiation as an Authorization Service forWeb Services
L.E. Olson
,
M. Winslett
,
G. Tonti
,
Nathan Seeley
,
Andrzej Uszok
,
J. Bradshaw
22nd International Conference on Data Engineering…
2006
Corpus ID: 3953410
Like other open computing environments, web services need a scalable method of determining authorized users. We present…
Expand
2004
2004
A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation
José A. Montenegro
,
Fernando Moya
European Public Key Infrastructure Workshop
2004
Corpus ID: 16327919
This work introduces a particular implementation of the X.509 Attribute Certificate framework (Xac), presented in the ITU-T…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
Review
2003
Review
2003
Public-key cryptography extensions into Kerberos
I. Downnard
2003
Corpus ID: 62625502
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are…
Expand
2003
2003
Kerberos: The Definitive Guide
J. Garman
2003
Corpus ID: 60632470
Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating…
Expand
Highly Cited
2002
Highly Cited
2002
A flexible, privacy-preserving authentication framework for ubiquitous computing environments
He Zheng
,
Jin Kwak
,
Kyungho Son
,
Wansuk Lee
,
Seungjoo Kim
,
Dongho Won
Proceedings 22nd International Conference on…
2002
Corpus ID: 2898992
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous…
Expand
Highly Cited
1998
Highly Cited
1998
Authentication for Mobile Agents
S. Berkovits
,
J. Guttman
,
Vipin Swarup
Mobile Agents and Security
1998
Corpus ID: 13987376
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE