[1]
|
MIT (2012) Kerberos: The Network Authentication Protocol. http://web.mit.edu/Kerberos/
|
[2]
|
Zrelli, S. and Shinoda, Y. (2007) Specifying Kerberos over EAP: Towards an Integrated Network Access and Kerberos Single Sign-On Process. 21st International Conference on Advanced Information Networking and Applications, Niagara Falls, ON, 2007, 490-497.
|
[3]
|
Rahnama, B., Sari, A. and Ghafour, M.Y. (2016) Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation. In: Singh, D.G.M. and Jayanthi, M., Eds., Network Security Attacks and Countermeasures, Information Science Reference, Hershey, PA, 270-312.
|
[4]
|
Hornquist Astrand, L. and Yu, T. (2012) Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos. http://tools.ietf.org/html/rfc6649
|
[5]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, No. 3.
|
[6]
|
Thorat, S.S., Sawant, H.K., Gaikwad, S.S. and Chavan, G.T. (2010) Comparative Study of Various PKINIT Methods Used in Advanced Kerberos. International Journal on Computer Science and Engineering, 2, 2337-2344.
|
[7]
|
Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, 2013, 334-337. https://doi.org/10.1109/cicsyn.2013.79
|
[8]
|
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A. and Walstad, C. (2006) Formal Analysis of Kerberos 5. Theoretical Computer Science-Automated Reasoning for Security Protocol Analysis, 367, 57-87.
|
[9]
|
Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372.
|
[10]
|
Hellewell, P.L., van der Horst, T.W. and Seamons, K.E. (2007) Extensible Pre-Authentication Kerberos. Computer Security Applications Conference, Miami Beach, FL, 2007, 201-210.
|
[11]
|
Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, 2, 1-6. https://doi.org/10.14738/tnc.25.431
|
[12]
|
Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.-K. and Walstad, C. (2008) Breaking and Fixing Public-Key Kerberos. Information and Computation, 206, 402-424.
https://doi.org/10.1016/j.ic.2007.05.005
|
[13]
|
Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.
|
[14]
|
Eum, S.-H. and Choi, H.-K. (2008) EAP-Kerberos II: An Adaptation of Kerberos to EAP for Mutual Authentication. 8th International Conference on ITS Telecommunications, Phuket, 24 October 2008, 78-83.
|
[15]
|
Ahmed, A., Alazzawe, A., Nawaz, A. and Wijesekera, D. (2008) Extracting Kerberos Passwords through RC4-HMAC Encryption Type Analysis. Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications, Doha, 31 March-4 April 2008, 679-685.
|
[16]
|
Shukla, P.K., Mishra, G.S., Girdhar, P.G., Rusia, P. and Kapoor, V. (2009) Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type Analysis with RC-4 Encryption. 6th International Conference on Information Technology: New Generations, Las Vegas, 27-29 April 2009, 1581-1582.
|
[17]
|
Sari, A. (2015) Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. In: Dawson, M. Ed., New Threats and Countermeasures in Digital Crime and Cyber Terrorism, IGI Global, Hershey, 66-94. https://doi.org/10.4018/978-1-4666-8345-7
|
[18]
|
El-Emam, E., Koutb, M., Kelash, H. and Allah, O.F. (2009) An Optimized Kerberos Authentication Protocol. International Conference on Computer Engineering & Systems, Cairo, 14-16 December 2009, 508-513.
|
[19]
|
Yilmaz, O., Kirencigil, B.Z. and Sari, A. (2016) VAN Based Theoretical EDI Framework to Enhance Organizational Data Security for B2B Transactions and Comparison of B2B Cryptographic Application Models. International Journal of Scientific & Engineering Research, 7, 1012-1020.
|
[20]
|
Hu, D. and Du, Z. (2010) An Improved Kerberos Protocol Based on Fast RSA Algorithm. IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, 17-19 December 2010, 274-278.
|
[21]
|
Sari, A. and Karay, M. (2015) Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 567-577. https://doi.org/10.4236/ijcns.2015.813051
|
[22]
|
Abdelmajid, N.T., Hossain, M.A., Shepherd, S. and Mahmoud, K. (2010) Location-Based Kerberos Authentication Protocol. IEEE 2nd International Conference on Social Computing (SocialCom), Minneapolis, 20-22 August 2010, 1099-1104.
|
[23]
|
Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, November 26-28 2013, 454-456. https://doi.org/10.1145/2523514.2523586
|
[24]
|
Fan, K., Li, H. and Wang, Y. (2009) Security Analysis of the Kerberos Protocol Using BAN Logic. 5th International Conference on Information Assurance and Security, Xi’an, 18-20 August 2009, 467-470.
|
[25]
|
Al-Janabi, S.T.F. and Rasheed, M.A.-S. (2011) Public-Key Cryptography Enabled Kerberos Authentication. Developments in E-Systems Engineering (DeSE), Dubai, 6-8 December 2011, 209-214.
|
[26]
|
Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18. https://doi.org/10.14738/tmlai.25.430
|
[27]
|
Zhu, J.L., Leach, P. and Kerberos, K. (2006) Cryptosystem Negotiation Extension. Internet Engineering Task Force. http://tools.ietf.org/html/rfc4537
|
[28]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
https://doi.org/10.4236/ijcns.2015.83003
|
[29]
|
Zhu, H.L., Leach, P. and Anonymity, S. (2011) Support for Kerberos. Internet Engineering Task Force. http://tools.ietf.org/html/rfc6112
|
[30]
|
Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154. https://doi.org/10.4236/jis.2015.62015
|
[31]
|
Neuman, C., Yu, T., Hartman, S. and Raeburn, K. (2005) The Kerberos Network Authentication Service (V5). Internet Engineering Task Force. http://tools.ietf.org/html/rfc4120
|
[32]
|
Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. https://doi.org/10.4236/ijcns.2015.83004
|
[33]
|
Kirencigil, B.Z., Yilmaz, O. and Sari, A. (2016) Unified 3-Tier Security Mechanism to Enhance Data Security in Mobile Wireless Networks. International Journal of Scientific & Engineering Research, 7, 1001-1011.
|
[34]
|
Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273. https://doi.org/10.4236/ijcns.2015.87026
|
[35]
|
Certicom Research (2000) SEC 1: Elliptic Curve Cryptography.
|
[36]
|
Choi, H.-K. and Han C.-K. (2008) An Adoption of Kerberos to 3G Network for Mutual Authentication: Challenges and Evaluations. International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Edinburgh, 16-18 June 2008, 448-455.
|
[37]
|
Blanchet, B., Jaggard, A.D., Scedrov, A. and Tsay, J.-K. (2008) Computationally Sound Mechanized Proofs for Basic and Public-Key Kerberos. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, 18-20 March 2008, 87-99.
|
[38]
|
Sari, A., Rahnama, B., Eweoya, I. and Agdelen, Z. (2016) Energizing the Advanced Encryption Standard (AES) for Better Performance. International Journal of Scientific & Engineering Research, 7, 992-1000.
|
[39]
|
Kamada, K., Sakane, S., Miyazawa, K. and Okabe, N. (2008) Design and Evaluation of a Client-Friendly Cross-Realm Framework for Kerberos 5. IEEE 6th International Conference on Industrial Informatics, Daejeon, 13-16 July 2008, 541-546.
|
[40]
|
Ke, J., Chen, X. and Xu, G. (2008) The Improved Public Key Encryption Algorithm of Kerberos Protocol Based on Braid Groups. 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 12-14 October 2008, 1-4.
|
[41]
|
Karaduman, A., Atasoy, U. and Sari, A. (2016) 21st Century’s Developing Technology: “Information Communication Technologies” and “Cyber Security” (21. Yüzyilin Gelisen Teknolojisi “Bilgi Iletisim Teknolojileri” ve “Siber Güvenlik”). International Conference on Research in Education and Science (ICRES2016), Bodrum, Turkey, 19-22 May 2016.
|
[42]
|
Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A. and Tsay, J.-K. (2011) Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. International Journal of Information Security, 10, 107-134. https://doi.org/10.1007/s10207-011-0125-6
|