Verifying Confidentiality and Authentication in Kerberos 5.
Frederick ButlerIliano CervesatoAaron D. JaggardAndre ScedrovPublished in: ISSS (2003)
Keyphrases
- authentication mechanism
- authentication protocol
- security analysis
- data encryption
- password authentication
- data confidentiality
- trusted third party
- mutual authentication
- security properties
- key distribution
- smart card
- authentication scheme
- secret key
- user authentication
- information security
- access control
- lightweight
- data quality
- security protocols
- security mechanisms
- public key
- biometric authentication
- identity authentication
- privacy protection
- rfid tags
- model checking
- third party
- image authentication
- information systems
- information leakage
- security services
- security requirements