Active Bibliography

Final Report And Recommendations Of The Esnet Authentication Pilot Project – G. R. Johnson, C.L. Athey, D. E. Engert, J. P. Moore, J.E. Ramus - 1995
Network Working Group J. Kohl Request for Comments: 1510 Digital Equipment Corporation C. Neuman ISI September 1993 The Kerberos Network Authentication Service (V5) – Status Of This, C. Neuman, Athena Muse
Overview – J. Kohl, C. Neuman - 1993
161 The Kerberos Network Authentication Service (V5 – Clifford Neuman, John Kohl, Tom Yu, Sam Hartman, Ken Raeburn - 1993
7 Protection and Security Issues for Future Systems – B. Clifford Neuman - 1991
3 The Design, Implementation, And Evaluation Of Cryptographic Distributed Applications: Secure PVM – Nair Venugopal - 1996
Overcoming Kerberos . . . – Hany M. Harb, Montaser M. Mohammed, Yousef B. Mahdy, Yasser F. Uthman
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
6 Variations on the Themes of Message Freshness and Replay - or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols – Li Gong - 1993
113 Protecting Poorly Chosen Secrets from Guessing Attacks – Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer - 1993
443 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
46 On Internet Authentication – N. Haller, R. Atkinson - 1994
12 SNP: An Interface for Secure Network Programming – Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su, Simon S. Lam - 1994
Design and Performance Evaluation of the Nested Certification . . . – Albert Levi - 1999
1 Requirements for TRIPS – Thomas Setz, Zohar Levy - 1996
3 The Evolution of the Kerberos Authentication Service", in an IEEE Computer Society Text soon to be published – John T. Kohl, B. Clifford Neuman, Theodore Y. Ts'o, John T. Kohl, B. Cliffo£d Neuman, Theodore Y. Ts'o, John T. Kohl, B. Clifford Neuman, Theodore Y. Ts'o - 1992
A New Authentication System – Yasser Farouq Uthman - 2004
55 A Security Risk of Depending on Synchronized Clocks – Li Gong - 1991
38 Recent-secure authentication: enforcing revocation in distributed systems – Stuart G. Stubblebine - 1995