A new two-server authentication and key agreement protocol for accessing secure cloud services

D Chattaraj, M Sarma, AK Das - Computer Networks, 2018 - Elsevier
Emerging Cloud computing paradigm came up with the on-demand ubiquitous service
sharing facility via the Internet. In this synergy, the cloud service providers provide various …

HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform

D Chattaraj, M Sarma, AK Das, N Kumar… - IEEE …, 2018 - ieeexplore.ieee.org
Hadoop framework has been evolved to manage big data in cloud. Hadoop distributed file
system and MapReduce, the vital components of this framework, provide scalable and fault …

An improved Kerberos protocol based on Diffie-Hellman-DSA key exchange

Z Hu, Y Zhu, L Ma - 2012 18th IEEE international conference …, 2012 - ieeexplore.ieee.org
Kerberos is a widely-used network authentication protocol based on a trusted third-party.
PKINIT, an enhanced Kerberos protocol which uses PKI mechanism, can prevent the …

Improvement of Kerberos protocol based on dynamic password and “One-time public key”

Y Du, H Ning, P Yang, Y Cui - 2014 10th International …, 2014 - ieeexplore.ieee.org
We begin with overviews of the existing defects of the current Kerberos protocol and the
shortage of the current improvement, and then we focus on the new method of the dynamic …

Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal

Y Kirsal, O Gemikonakli - 2008 7th IEEE International …, 2008 - ieeexplore.ieee.org
Kerberos is a widely used computer network authentication protocol which allows
individuals communicating over an insecure network to prove their identity to one another in …

The performance analysis of public key cryptography-based authentication

K Xiong - EAI Endorsed Transactions on Security and Safety, 2018 - publications.eai.eu
Several Kerberos-based authentication techniques using public-key cryptography have
been proposed. Public-key cryptography can be used to eliminate a single point failure …

Analysing the combined kerberos timed authentication protocol and frequent key renewal using CSP and rank functions

Y Kirsal-Ever, A Eneh, O Gemikonakli… - KSII Transactions on …, 2014 - koreascience.kr
Authentication mechanisms coupled with strong encryption techniques are used for network
security purposes; however, given sufficient time, well-equipped intruders are successful for …

Improved Kerberos protocol based on sliding window and its formal analysis

Y Ren, X Yan, H Guo - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Aiming at the problem that the time stamp mechanism in the Kerberos protocol cannot
effectively resist replay attacks, this paper proposes an improved kerberos protocol based …

Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions

Y Kirsal, O Gemikonakli - Global Security, Safety, and Sustainability: 5th …, 2009 - Springer
Despite advances in network security, malicious attacks have shown a significant increase
in recent times. Authentication mechanisms coupled with strong encryption techniques are …

The performance of public key-based authentication protocols

K Xiong - Network and System Security: 6th International …, 2012 - Springer
Kerberos has revolved over the past 20 years. Kerberos and its variants have been
extensively used in a variety of commuting systems since 1999. Among them, there have …