The use of Encryption in Kerberos for Network Authentication.
John T. KohlPublished in: CRYPTO (1989)
Keyphrases
- virtual private network
- security analysis
- secret key
- mutual authentication
- authentication mechanism
- data encryption
- network structure
- encryption decryption
- identity authentication
- encryption scheme
- authentication protocol
- wireless sensor networks
- complex networks
- network management
- authentication scheme
- public key cryptography
- computer networks
- peer to peer
- network communication
- trusted third party
- image authentication
- public key
- network traffic
- integrity verification