Limitations of the Kerberos authentication system.
Steven M. BellovinMichael MerrittPublished in: Comput. Commun. Rev. (1990)
Keyphrases
- authentication protocol
- authentication mechanism
- security analysis
- key distribution
- smart card
- password authentication
- trusted third party
- mutual authentication
- secret key
- authentication scheme
- data encryption
- biometric authentication
- user authentication
- digital signature
- security mechanisms
- database
- secret sharing scheme
- single point of failure
- rfid tags
- semi fragile watermarking