Using Kerberos Version 5 over the Transport Layer Security (TLS) Protocol.
Simon JosefssonPublished in: RFC (2011)
Keyphrases
- transport layer
- network layer
- physical layer
- application layer
- end to end
- authentication protocol
- mutual authentication
- security analysis
- network monitoring
- wireless communication
- routing protocol
- key distribution
- cross layer
- security protocols
- computer networks
- network congestion
- ip address
- rate control
- trusted third party
- multi hop
- network architecture
- internet protocol
- transport protocol
- ddos attacks
- resource utilization
- smart grid
- communication systems
- ad hoc networks
- smart card
- communication protocol
- secret key
- security policies
- network security
- access control