A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
IAuth: An authentication system for Internet applications
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Design of an Authentication Protocol for Gsm Javacards
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Single Sign-On and the System Administrator
LISA '98 Proceedings of the 12th USENIX conference on System administration
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Kerberos security with clocks adrift
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Petri nets-based models for basic authentication procedure
COMATIA'10 Proceedings of the 2010 international conference on Communication and management in technological innovation and academic globalization
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
Two efficient and secure authentication schemes using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Securely propagating authentication in an ensemble of personal devices using single sign-on
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Password exhaustion: predicting the end of password usefulness
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Tutorial: Security in computer networks and distributed systems
Computer Communications
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Research note: Replay tolerance of authentication protocols
Computer Communications
Understanding the weaknesses of human-protocol interaction
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The Kerberos authentication system, a part of MIT's Project Athena, has been adopted by other organizations. Despite Kerberos's many strengths, it has a number of limitations and some weaknesses. Some are due to specifics of the MIT environment; others represent deficiencies in the protocol design. We discuss a number of such problems, and present solutions to some of them. We also demonstrate how special-purpose cryptographic hardware may be needed in some cases.