The Kerberos Network Authentication Service (V5).
John T. KohlB. Clifford NeumanPublished in: RFC (1993)
Keyphrases
- trusted third party
- network services
- authentication protocol
- network access
- web services
- service providers
- security analysis
- network resources
- authentication mechanism
- application level
- access points
- network traffic
- complex networks
- communication networks
- neural network
- network structure
- peer to peer
- virtual private network
- service oriented
- computer networks
- key distribution
- cognitive radio
- steady state
- wireless networks
- wireless sensor networks
- transport network
- protocol specification