Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol.
NitinDurg Singh ChauhanVivek Kumar SehgalAnkit MahanotPallavi SinghSohit AhujaUtkarsh ShrivastavaManisha RanaVineet PunjabiShivam VinayNakul SharmaPublished in: ACIS-ICIS (2008)
Keyphrases
- security analysis
- authentication protocol
- mutual authentication
- smart card
- public key
- user authentication
- symmetric key
- security model
- high security
- security properties
- security requirements
- key exchange
- encryption scheme
- authentication mechanism
- encryption algorithm
- secure electronic
- cryptographic protocols
- authentication scheme
- private key
- public key cryptography
- key distribution
- digital signature
- secret key
- rfid tags