Skip to search formSkip to main contentSkip to account menu

Kerberos

Known as: Windows 2000 security, Kerberized, Kerberos-protocols 
Kerberos /ˈkərbərɒs/ is a computer network authentication protocol that works on the basis of 'tickets' to allow nodes communicating over a non… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any… 
2007
2007
Using the notion of interpretation functions, this paper gives some sufficient and practical conditions allowing to guarantee the… 
2006
2006
Like other open computing environments, web services need a scalable method of determining authorized users. We present… 
2004
2004
This work introduces a particular implementation of the X.509 Attribute Certificate framework (Xac), presented in the ITU-T… 
Highly Cited
2003
Highly Cited
2003
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message… 
Review
2003
Review
2003
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are… 
2003
2003
Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating… 
Highly Cited
2002
Highly Cited
2002
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous… 
Highly Cited
1998
Highly Cited
1998
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many…