Provable-security analysis of authenticated encryption in Kerberos
- 9 December 2011
- journal article
- Published by Institution of Engineering and Technology (IET) in IET Information Security
- Vol. 5 (4) , 207-219
- https://doi.org/10.1049/iet-ifs.2011.0041
Abstract
No abstract availableKeywords
This publication has 4 references indexed in Scilit:
- Formal analysis of Kerberos 5Theoretical Computer Science, 2006
- Completeness theorems for the Abadi–Rogaway language of encrypted expressions1Journal of Computer Security, 2004
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983