Further improvements to the kerberos timed authentication protocol

Y Kirsal, O Gemikonakli - Novel Algorithms and Techniques in …, 2008 - Springer
Authentication mechanisms coupled with strong encryption techniques are used for security
purposes; however, at times, well-equipped intruders succeed in breaking encryption and …

Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal

Y Kirsal, O Gemikonakli - 2008 7th IEEE International …, 2008 - ieeexplore.ieee.org
Kerberos is a widely used computer network authentication protocol which allows
individuals communicating over an insecure network to prove their identity to one another in …

An authentication protocol to address the problem of the trusted 3rd party authentication protocols

Y Kirsal, O Gemikonakli - Innovative Algorithms and Techniques in …, 2007 - Springer
The development of authentication protocols to secure networks, data and resources is one
of the main interests in ensuring secure communication in modern world. Kerberos is a …

Analysing the combined kerberos timed authentication protocol and frequent key renewal using CSP and rank functions

Y Kirsal-Ever, A Eneh, O Gemikonakli… - KSII Transactions on …, 2014 - koreascience.kr
Authentication mechanisms coupled with strong encryption techniques are used for network
security purposes; however, given sufficient time, well-equipped intruders are successful for …

Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions

Y Kirsal, O Gemikonakli - Global Security, Safety, and Sustainability: 5th …, 2009 - Springer
Despite advances in network security, malicious attacks have shown a significant increase
in recent times. Authentication mechanisms coupled with strong encryption techniques are …

Modelling Attacker with Deciding Security Properties by Induction and Deduction

Y Kirsal-Ever, A Eneh, O Gemikonakli… - 2013 27th …, 2013 - ieeexplore.ieee.org
Formal methods for verifying cryptographic protocols are used to assist in ensuring that
authentication protocols meet their specifications. Model checking techniques such as CSP …