Performance analysis of the Kerberos protocol in a distributed environment.
Mahmoud T. El-HadidiNadia Hamed HegaziHeba Kamal AslanPublished in: ISCC (1997)
Keyphrases
- distributed environment
- authentication protocol
- interprocess communication
- security analysis
- trusted third party
- distributed systems
- mutual authentication
- key distribution
- distributed databases
- intelligent agents
- distributed computing
- peer to peer
- lightweight
- distributed computing environment
- smart card
- distributed data mining
- highly distributed
- peer to peer networks
- multi agent
- password authentication
- public key
- secret key
- database
- privacy protection
- security protocols
- third party
- rfid systems
- query routing
- intelligent systems
- expert systems
- multi agent systems
- mining of association rules
- multimedia
- key exchange protocol
- knowledge base
- databases