Coloured Petri nets: basic concepts, analysis methods and practical use, volume 3
Coloured Petri nets: basic concepts, analysis methods and practical use, volume 3
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
Petri Net Theory and the Modeling of Systems
Petri Net Theory and the Modeling of Systems
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Petri Nets for System Engineering: A Guide to Modeling, Verification, and Applications
Petri Nets for System Engineering: A Guide to Modeling, Verification, and Applications
Kerberos Version 4: Inductive Analysis of the Secrecy Goals
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
The use of Encryption in Kerberos for Network Authentication
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
On Message Integrity in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
Hi-index | 0.00 |
This paper presents results of user name, passwords and keystroke dynamics authentication research. In this study as a tool was Petri net technique chosen. Experiments were made with two groups of models. One consists of combination of the User name and password with and/or without repeating. The second group consist of the user name, password and keystroke dynamics with and/or without repeating. The goal of this paper is to demonstrate that possibility to repeating leads to decreasing security.