2007
DOI: 10.1109/aina.2007.130
|View full text |Cite
|
Sign up to set email alerts
|

Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Several target mobile vehicular networks (II) (9) while others provide general security for traditional IT networks ( 10) or wireless network topologies. ( 12 ) There are a few attempts at providing authentication and authorization security for control system networks.…”
Section: Control Stationmentioning
confidence: 99%
“…Several target mobile vehicular networks (II) (9) while others provide general security for traditional IT networks ( 10) or wireless network topologies. ( 12 ) There are a few attempts at providing authentication and authorization security for control system networks.…”
Section: Control Stationmentioning
confidence: 99%
“…In a previous work [9], we investigated the convenience of using Kerberos as authentication mechanism for link layer access control and a reference implementation of the mechanism was made available [10].…”
Section: A Overviewmentioning
confidence: 99%
“…Hence, the Kerberos [1] was developed by Massachusetts Institute of Technology to provide a stronger authentication for both client and server applications irrespective of the communication medium used (secured or not). The protocol can be integrated with an already existing network without the need for additional protocols to secure communication over that network because the Kerberos can use the already existing username and password for users, to perform its authentication processes [2] [3].…”
Section: Introductionmentioning
confidence: 99%