Security of Encrypted rlogin Connections Created With Kerberos IV.
Kirsten HildrumPublished in: NDSS (2000)
Keyphrases
- encryption decryption
- secret key
- encryption scheme
- authentication protocol
- security analysis
- authentication mechanism
- public key cryptosystem
- encryption algorithm
- access control
- encryption key
- mutual authentication
- security requirements
- security level
- information security
- data security
- network security
- key distribution
- public key
- security systems
- security mechanisms
- intrusion detection
- authentication scheme
- data encryption
- security properties
- information systems
- smart card
- security issues
- rfid systems
- security policies
- computer security
- security protocols