搜索结果: 1-9 共查到“军队指挥学 Kerberos”相关记录9条 . 查询时间(0.171 秒)
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
复旦大学计算机科学与技术学院信息安全课件 Authentication Kerberos
复旦大学计算机科学与技术学院 信息安全 课件 Authentication Kerberos
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Authentication Kerberos。
Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft's Active Directory and shipped with every major operating system, and...
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
BR model timestamp
2013/9/18
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to mod...
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
cryptographically sound security proof public-key kerberos
2008/12/2
We present a computational analysis of core Kerberos with
public-key authentication (PKINIT) in which we consider authentication
and key secrecy properties. These proofs rely on the Dolev-Yao
styl...
We report on a man-in-the-middle attack on PKINIT, the
public key extension of the widely deployed Kerberos 5 authentication
protocol. This flaw allows an attacker to impersonate Kerberos administra...
Provable-Security Analysis of Authenticated Encryption in Kerberos
Provable-Security Authenticated Encryption Kerberos
2008/8/21
Kerberos is a widely-deployed network authentication protocol that is being considered for
standardization. Many works have analyzed its security, identifying flaws and often suggesting
fixes, thus ...
Kerberos认证协议的研究和改进
Kerberos协议 ECC算法 AES算法 Rijndael算法
2008/5/17
分析比较了新Kerberos认证协议与原Kerberos认证协议,指出了对Kerberos改进的一些主要方面,并指出了其局限性。在此基础上提出了将公钥密码体制ECC与对称密码体制AES引入到Kerberos认证协议中的方案。该方案不仅解决了Kerberos认证协议中密钥的分配和管理问题, 而且提高了Kerberos认证协议的安全性,使其遭受口令攻击的危险得到降低,更好地解决了工业控制网络的身份认证...
基于Kerberos的移动Ad-hoc网络安全认证方案
安全认证 移动Ad-hoc网络 网络安全 Kerberos协议
2008/5/17
提出了基于Kerberos的移动Ad-hoc网的安全认证机制KADH,它继承了传统Kerberos系统中一些在Ad-hoc网络环境中实用的特性。同时针对结点的移动性和简短性,引入了复制、选择和校验机制确保了连接的安全性,同时使来自网络内部的恶意攻击的危险性降到最低。