Limitations of the Kerberos Authentication System.
Steven M. BellovinMichael MerrittPublished in: USENIX Winter (1991)
Keyphrases
- authentication mechanism
- authentication protocol
- security analysis
- password authentication
- trusted third party
- key distribution
- mutual authentication
- secret key
- user authentication
- authentication scheme
- data encryption
- biometric authentication
- smart card
- lightweight
- third party
- security services
- low cost
- public key
- power consumption
- case study
- learning algorithm