Timestamps in key distribution protocols
Communications of the ACM
NetBill: An Internet commerce system optimized for network delivered services
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Verifying cryptographic protocols for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Kerberos plus RSA for world wide web security
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
Open Authentication Model Supporting Electronic Commerce in Distributed Computing
Electronic Commerce Research
Authentication Service Model Supporting Multiple Domains in Distributed Computing
ICCS '01 Proceedings of the International Conference on Computational Sciences-Part I
Flexible Authentication with Multiple Domains of Electronic Commerce
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A hybrid authentication protocol for large mobile network
Journal of Systems and Software
Cryptanalysis of a hybrid authentication protocol for large mobile networks
Journal of Systems and Software
Secure coprocessor integration with kerberos V5
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A distributed expansible authentication model based on Kerberos
Journal of Network and Computer Applications
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
An authentication architecture dedicated to dependent people in smart environments
ICOST'07 Proceedings of the 5th international conference on Smart homes and health telematics
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Securing the core university business processes
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
The performance of public key-based authentication protocols
NSS'12 Proceedings of the 6th international conference on Network and System Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.