An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions.
Fadi Al-AyedChunqiang HuHang LiuPublished in: Int. J. Netw. Secur. (2018)
Keyphrases
- markov chain
- authentication protocol
- steady state
- transition probabilities
- file transfer
- security issues
- finite state
- random walk
- stationary distribution
- mutual authentication
- markov process
- monte carlo method
- monte carlo simulation
- state space
- markov model
- monte carlo
- trusted third party
- security analysis
- transition matrix
- privacy protection
- rfid systems
- security mechanisms
- security services
- password authentication
- sensitive data
- markov chain monte carlo
- digital signature
- security protocols
- key management
- personal information
- smart card
- directed graph
- genetic algorithm