Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications
DOI: 10.1007/978-1-4020-6266-7_95
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Protocol to Address the Problem of the Trusted 3rd Party Authentication Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…However, it produces delays during the transactions of authentication messages between client and server. Recent increase in the speed of wireless networks outperformed proxy servers, leading to insufficient services which resulted in bottle-necks and increased response times [7].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…However, it produces delays during the transactions of authentication messages between client and server. Recent increase in the speed of wireless networks outperformed proxy servers, leading to insufficient services which resulted in bottle-necks and increased response times [7].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed framework [8] and protocol script [7], [9] provide a design of a security solution for wireless local area networks. Since the Kerberos Authentication Protocol is a trusted third party authentication protocol, its paradigms and entities are finalised for the proposed framework [6], [8].…”
Section: Work In Progressmentioning
confidence: 99%
See 3 more Smart Citations