Kerberos

Results: 405



#Item
31

Computationally Sound Mechanized Proofs for Basic and Public-key Kerberos Bruno Blanchet1 Aaron D. Jaggard2 Joe-Kai Tsay3

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:57
    32

    Kerberos und NFSv4 Alexander Kaiser AG Technische Informatik 27. November 2012

    Add to Reading List

    Source URL: www.cebitec.uni-bielefeld.de

    Language: German - Date: 2012-12-17 10:40:10
      33Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

      Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2010-10-29 15:08:35
      34

      Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan∗ University of Texas at San Antonio , Abstract

      Add to Reading List

      Source URL: isyou.info

      Language: English - Date: 2015-08-01 03:16:29
        35Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

        A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2010-07-17 01:14:08
        36Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

        Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2010-07-17 01:14:15
        37Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

        Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

        Add to Reading List

        Source URL: seclab.stanford.edu

        Language: English - Date: 2010-07-17 01:14:15
        38

        暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:Kerberos Basic 2.関連する標準:R・RFC4120 (The Kerberos Network Authentication Se

        Add to Reading List

        Source URL: crypto-protocol.nict.go.jp

        Language: Japanese - Date: 2015-10-20 00:24:04
          UPDATE