The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network security has become more significant to users computers, associations, and even in military applications. With the presence of internet, security turned into a considerable issue. The Address Resolution Protocol (ARP) is used by computers on a Local Area Network (LAN) in order to map each network address (IP) to its physical address (MAC). This protocol has been verified to function well under...
The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp...
Kerberos is a widely-adopted network authentication protocol, which provides secure authentication service based on the reliable third-party. By exploiting a shared key, Kerberos ensures the confidentiality and integrity for a session. Kerberos, an authentication protocol based on symmetric cryptography system, has some inherent security flaws, such as undeniability, difficulty in key exchange, inability...
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
The degree to which a cryptographic protocol is susceptible to successful attacks or penetrations cannot be accurately calculated because of the more fine and fast algorithms to break ciphers, being introduced. To deal with the issue, analysis of a cryptographic protocol becomes more vital; and more exhaustive search for vulnerabilities is required. Kerberos is a widely used security protocol for...
Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. There are many evaluation tools such as BAN Logic to evaluate how secure authentication protocols' messages are. Despite the evaluation...
Because of the password attack and the replay attack are existing comparatively serious threats for a traditional single sign-on protocol, and the most methods of this issue solving are all not paying the attention to impact on the whole system caused by unsafe client. In this regard, this study proposes an improved single sign-on protocol. Based on the traditional single sign-on protocol, it increases...
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business process logic. Traditional workflow management models have obvious shortcomings in describing complex workflows. Such complexity is due not only to the complicated dependencies among tasks,...
In order to prevent password attack and replay attack existing in Kerberos protocol, the traditional method was to make use of encryption techniques and authentication techniques on enhancing the security of protocol itself, but it was failure to prevent protocol's external factors of impacting on security. In this regard, this paper proposes to use of the method of fuzzy control to realize the security...
In order to avoid security threats caused by password attack and replay attack in single sign-on protocol, the most methods on solving these issues are making use of complicated techniques and equipment, no-doubt this increases the degree of complication and cost of the system, and reduces the usability as well. In this regard, this study proposes an new scheme based on dynamic double password and...
Millicent is a excellent micropayment protocol, its script is similar to the ticket of Kerberos protocol. So it can simplify Millicent protocol according to Kerberos protocol. It constructs a new authentication based on micropayment, absorbed Kerberos authentication idea. In the new authentication protocol, there are four symmetrical encryptions and two hashing functions, so authentication efficiency...
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the...
A distributed system provides user with the ease of being accessible globally through the internet. Our image based authentication (IBA) system provides exactly that. The system is developed for academic use at Jaypee University of Information Technology (JUIT), provides a host of features that makes it user friendly and one of the most advanced IBA system till date. Secure environments protect their...
With the broad application of UNIX and its descendants in recent years, heterogeneous network environment is a must to maximize the enterprise's freedom of choice. However, because of different accounts formats and authentication mechanisms of various operating system (OS), heterogeneous network environment also increases difficulties for system management and security implementation. Facing the situation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.