The use of Encryption in Kerberos for Network Authentication
- 6 July 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Message authenticationIEEE Communications Magazine, 1985
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Timer-based mechanisms in reliable transport protocol connection managementComputer Networks (1976), 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978