We started this thesis with the review in area of many different authenticational protocols, more detailed description of the three most important authenticational protocols (RADIUS, LDAP and KERBEROS) follow, also cryptographic methods, hash functions and PKI infrastructure are described. We concluded the theoretical part of the thesis with safety aspects of protocols RADIUS and LDAP and also vulnerability of KERBEROS protocol, where we obtained proper quotes, which we also commented. The next part brings an overview of the selected authenticational servers and also comparison of authentications follow. Finding differences between them was also the goal of this thesis. We used servers FreeRADIUS, OpenLDAP and FreeIPA, which we installed on...
One of the most important parts of any system is authentication. Appreciated as the first and the la...
This document describes methods of user authentication and authorisation via a trusted server. There...
(Lightweight Directory Access Protocol) is used to replace the local user account authentication. Ou...
The main focus of this Master’s thesis is user authentication and access control in a computer netwo...
This bachelor's thesis maps the most used AAA protocols in these days. These protocols include RADIU...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
This thesis deals with authentication methods, especially about authentication based on knowledge. I...
M.Sc.(Computer Science)The aim of this dissertation (referred to as thesis in the rest of the docume...
The main focus of Master’s thesis is modern methods for user authentication. In the first part are b...
Abstract — Kerberos is the widely deployed authentication protocol. This document gives you comparis...
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as...
Authentication is a process that ensures and confirms a users identity. Authorization is the process...
ABSTRAKSI: Protokol autentikasi digunakan untuk mengatur mekanisme bagaimana tata cara berkomunikasi...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
The master thesis is divided into two parts. In the first part, identity management is described on ...
One of the most important parts of any system is authentication. Appreciated as the first and the la...
This document describes methods of user authentication and authorisation via a trusted server. There...
(Lightweight Directory Access Protocol) is used to replace the local user account authentication. Ou...
The main focus of this Master’s thesis is user authentication and access control in a computer netwo...
This bachelor's thesis maps the most used AAA protocols in these days. These protocols include RADIU...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
This thesis deals with authentication methods, especially about authentication based on knowledge. I...
M.Sc.(Computer Science)The aim of this dissertation (referred to as thesis in the rest of the docume...
The main focus of Master’s thesis is modern methods for user authentication. In the first part are b...
Abstract — Kerberos is the widely deployed authentication protocol. This document gives you comparis...
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as...
Authentication is a process that ensures and confirms a users identity. Authorization is the process...
ABSTRAKSI: Protokol autentikasi digunakan untuk mengatur mekanisme bagaimana tata cara berkomunikasi...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
The master thesis is divided into two parts. In the first part, identity management is described on ...
One of the most important parts of any system is authentication. Appreciated as the first and the la...
This document describes methods of user authentication and authorisation via a trusted server. There...
(Lightweight Directory Access Protocol) is used to replace the local user account authentication. Ou...