On Group Communication Systems: Insight, a Primer, and a Snapshot
ICCS '01 Proceedings of the International Conference on Computational Sciences-Part I
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
SSU: Extending SSH for Secure Root Administration
LISA '98 Proceedings of the 12th USENIX conference on System administration
Cryptographic key exchange based on locationing information
Pervasive and Mobile Computing
LIPS: a lightweight permit system for packet source origin accountability
Computer Networks: The International Journal of Computer and Telecommunications Networking
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Computer Standards & Interfaces
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
Implementing Trusted Terminals with a and SITDRM
Electronic Notes in Theoretical Computer Science (ENTCS)
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
A round- and computation-efficient three-party authenticated key exchange protocol
Journal of Systems and Software
A distributed expansible authentication model based on Kerberos
Journal of Network and Computer Applications
Mobile services access and payment through reusable tickets
Computer Communications
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
Collaborative business and data privacy: Toward a cyber-control?
Computers in Industry - Special issue: The digital factory: an instrument of the present and the future
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Anonymous context based role activation mechanism
Proceedings of the 13th international conference on Security protocols
LTE key management analysis with session keys context
Computer Communications
Multi-Attacker Protocol Validation
Journal of Automated Reasoning
SP'04 Proceedings of the 12th international conference on Security Protocols
SP 800-63-1. Electronic Authentication Guideline
SP 800-63-1. Electronic Authentication Guideline
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Applying authorization to intranets: architectures, issues and APIs
Computer Communications
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A generic construction of accountable decryption and its applications
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Adaptive defenses for commodity software through virtual application partitioning
Proceedings of the 2012 ACM conference on Computer and communications security
Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
Journal of Medical Systems
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Bootstrapping a global SSO from network access control mechanisms
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
TransCom: a virtual disk based self-management system
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Stayin' alive: aliveness as an alternative to authentication
SP'12 Proceedings of the 20th international conference on Security Protocols
SmartK: Smart cards in operating systems at kernel level
Information Security Tech. Report
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
VeSPA: vehicular security and privacy-preserving architecture
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Toward designing a secure biosurveillance cloud
The Journal of Supercomputing
International Journal of Advanced Pervasive and Ubiquitous Computing
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Anonymous Shared Certificate Entity Authentication Protocol
Wireless Personal Communications: An International Journal
Scalable Metadata Management Through OSD+ Devices
International Journal of Parallel Programming
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security
Hi-index | 0.25 |
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can display the results to the user, or otherwise continue performing its intended function. This class of services includes remote login, file system reads and writes, and information retrieval for applications like Mosaic