Abstract. We present an authentication scheme and new protocol for domain-based scenarios with inter-domain authentication. Our protocol is primarily intended for domain-structured Peer-to-Peer systems but is applicable for any domain scenario where clients from different domains wish to authenticate to each other. To this end, we make use of Trusted Third Parties in the form of Domain Authentication Servers in each do-main. These act on behalf of their clients, resulting in a four-party pro-tocol. If there is a secure channel between the Domain Authentication Servers, our protocol can provide secure authentication. To address the case where domains do not have a secure channel between them, we ex-tend our scheme with the concept of trust-r...
The current status is that there is coexistence of different authentication mechanisms in heterogene...
Password-based authentication is the most popular authentication mechanism for humans today, not onl...
In large distributed networks, many computers must be mutual coordination to complete some works Und...
A fundamental concern in building a secure distributed system is authentication of local and remote ...
We revisit the problem of secure cross-domain communication between two users belonging to different...
We revisit the problem of secure cross-domain communication between two users belonging to different...
This paper describes the basic architecture of an authentication service for distributed systems in ...
This paper describes a design for an authentication service for a very large scale, very long lifeti...
AbstractIn a pervasive computing environment, mobile users often roam into foreign domains. Conseque...
We propose a four-party password authenticated interdomain key exchange protocol which makes use of ...
Authentication, inter-organizational security, multi-party interactions, Service-Oriented Architectu...
Modern distributed business applications are embedding an increasing degree of automation and dynami...
The current status is that there is coexistence of different authentication mechanisms in heterogene...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Abstract. The absence of manageable global key distribution schemes is seriously hindering the deplo...
The current status is that there is coexistence of different authentication mechanisms in heterogene...
Password-based authentication is the most popular authentication mechanism for humans today, not onl...
In large distributed networks, many computers must be mutual coordination to complete some works Und...
A fundamental concern in building a secure distributed system is authentication of local and remote ...
We revisit the problem of secure cross-domain communication between two users belonging to different...
We revisit the problem of secure cross-domain communication between two users belonging to different...
This paper describes the basic architecture of an authentication service for distributed systems in ...
This paper describes a design for an authentication service for a very large scale, very long lifeti...
AbstractIn a pervasive computing environment, mobile users often roam into foreign domains. Conseque...
We propose a four-party password authenticated interdomain key exchange protocol which makes use of ...
Authentication, inter-organizational security, multi-party interactions, Service-Oriented Architectu...
Modern distributed business applications are embedding an increasing degree of automation and dynami...
The current status is that there is coexistence of different authentication mechanisms in heterogene...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Abstract. The absence of manageable global key distribution schemes is seriously hindering the deplo...
The current status is that there is coexistence of different authentication mechanisms in heterogene...
Password-based authentication is the most popular authentication mechanism for humans today, not onl...
In large distributed networks, many computers must be mutual coordination to complete some works Und...