You et al., 2012 - Google Patents
Improved authentication model based on kerberos protocolYou et al., 2012
- Document ID
- 16998313003101254468
- Author
- You X
- Zhang L
- Publication year
- Publication venue
- Advances in Multimedia, Software Engineering and Computing Vol. 1: Proceedings of the 2011 MSEC International Conference on Multimedia, Software Engineering and Computing, November 26–27, Wuhan, China
External Links
Snippet
An improved authentication model was suggested in this paper. Based on the analysis of the basic principle and security of Kerberos protocol, the lightweight level ticket was used in the improved model and the disadvantages of Kerberos protocol were well settled by using …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100546245C (en) | Network authentication and key distribution method across security domains | |
US10243742B2 (en) | Method and system for accessing a device by a user | |
CN107257334B (en) | Identity authentication method for Hadoop cluster | |
CN100580657C (en) | Distributed single sign-on service | |
US8281136B2 (en) | Techniques for key distribution for use in encrypted communications | |
CN101159556B (en) | Key Management Method in Shared Encrypted File System Based on Group Key Server | |
CN106341232B (en) | A password-based anonymous entity authentication method | |
CN101834853B (en) | Method and system for sharing anonymous resource | |
Al-Janabi et al. | Public-key cryptography enabled kerberos authentication | |
CN102098317A (en) | Data transmitting method and system applied to cloud system | |
CA2551113A1 (en) | Authentication system for networked computer applications | |
CN103490881A (en) | Authentication service system, user authentication method, and authentication information processing method and system | |
US8392703B2 (en) | Electronic signature verification method implemented by secret key infrastructure | |
CN114513339A (en) | A security authentication method, system and device | |
CN115987502A (en) | A quantum communication identity authentication method and system for power grid dispatching business | |
CN108574576A (en) | Cross-cloud authentication method based on Kerberos system | |
CN111917543A (en) | User access cloud platform security access authentication system and application method thereof | |
CN107248997B (en) | Authentication method based on smart card in multi-server environment | |
CN116707854A (en) | A Robust Attribute-Based Encryption Access Control Method for Cloud Storage | |
JP4499575B2 (en) | Network security method and network security system | |
CN113556236B (en) | Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature | |
You et al. | Improved authentication model based on kerberos protocol | |
CN112035820B (en) | Data analysis method used in Kerberos encryption environment | |
JP2005086428A (en) | Method for performing encrypted communication with authentication, authentication system and method | |
Narwal et al. | Kerberos protocol: A review |