Guide to writing DCE applications
Guide to writing DCE applications
Understanding DCE
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
A security architecture for fault-tolerant systems
A security architecture for fault-tolerant systems
DCE security programming
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Introduction to Algorithms: A Creative Approach
Introduction to Algorithms: A Creative Approach
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
The Rampart Toolkit for Building High-Integrity Services
Selected Papers from the International Workshop on Theory and Practice in Distributed Systems
Key distribution without individual trusted authentification servers
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
SESAME V2 public key and authorisation extensions to Kerberos
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
A Security Architecture for Fault-Tolerant Systems
A Security Architecture for Fault-Tolerant Systems
Fault-tolerant authentication protocols
Fault-tolerant authentication protocols
Minimal backups of cryptographic protocol runs
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Hi-index | 0.00 |
This paper presents a solution to the problem of making a trusted third-party authentication protocol fault tolerant. We applied the general solution to the Needham and Schroeder and Kerberos authentication protocols. Finally, we discuss the implementation of a fault-tolerant Kerberos authentication protocol.