Sciweavers

28 search results - page 1 / 6
» An Authentication Protocol Based on Kerberos 5
Sort
View
IJNSEC
2011
116views more  IJNSEC 2011»
12 years 11 months ago
An Authentication Protocol Based on Kerberos 5
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...
NDSS
1997
IEEE
13 years 8 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
POPL
2005
ACM
13 years 10 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
CSFW
2002
IEEE
13 years 9 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...
NDSS
1999
IEEE
13 years 8 months ago
A Real-World Analysis of Kerberos Password Security
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...
Thomas D. Wu