Further improvements to the kerberos timed authentication protocol
Y Kirsal, O Gemikonakli - Novel Algorithms and Techniques in …, 2008 - Springer
Authentication mechanisms coupled with strong encryption techniques are used for security
purposes; however, at times, well-equipped intruders succeed in breaking encryption and …
purposes; however, at times, well-equipped intruders succeed in breaking encryption and …
Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal
Y Kirsal, O Gemikonakli - 2008 7th IEEE International …, 2008 - ieeexplore.ieee.org
Kerberos is a widely used computer network authentication protocol which allows
individuals communicating over an insecure network to prove their identity to one another in …
individuals communicating over an insecure network to prove their identity to one another in …
An authentication protocol to address the problem of the trusted 3rd party authentication protocols
Y Kirsal, O Gemikonakli - Innovative Algorithms and Techniques in …, 2007 - Springer
The development of authentication protocols to secure networks, data and resources is one
of the main interests in ensuring secure communication in modern world. Kerberos is a …
of the main interests in ensuring secure communication in modern world. Kerberos is a …
Analysing the combined kerberos timed authentication protocol and frequent key renewal using CSP and rank functions
Authentication mechanisms coupled with strong encryption techniques are used for network
security purposes; however, given sufficient time, well-equipped intruders are successful for …
security purposes; however, given sufficient time, well-equipped intruders are successful for …
Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
Y Kirsal, O Gemikonakli - Global Security, Safety, and Sustainability: 5th …, 2009 - Springer
Despite advances in network security, malicious attacks have shown a significant increase
in recent times. Authentication mechanisms coupled with strong encryption techniques are …
in recent times. Authentication mechanisms coupled with strong encryption techniques are …
Modelling Attacker with Deciding Security Properties by Induction and Deduction
Formal methods for verifying cryptographic protocols are used to assist in ensuring that
authentication protocols meet their specifications. Model checking techniques such as CSP …
authentication protocols meet their specifications. Model checking techniques such as CSP …