Login / Signup
An Authentication Protocol Based on Kerberos 5.
Eman El-Emam
Magdy Koutb
Hamdy M. Kelash
Osama S. Faragallah
Published in:
Int. J. Netw. Secur. (2011)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
security protocols
public key
secret key
user authentication
rfid tags
key distribution
authentication scheme
hash functions
rfid systems
password authentication
resource constrained
security requirements
trusted third party
mutual authentication