Today millions of ordinary citizens are using networks for banking, shopping and filing their tax return. Network security has become a massive problem. All this requires network to identify its legal users for providing services. An authentication protocol used is Kerberos which uses strong secret key for user authentication but it is vulnerable in case of weak passwords. Authentication & key distribution protocols requires sharing secret key(s) with a view that only the concerned users know to derive the information from it. These protocols are vulnerable to key guessing attacks. Another important consideration is perfect forward secrecy in which our proposed scheme cover cases with application servers, authentication servers or...
While using the growing use of very network-attached storage systems, several works has focussed on ...
[[abstract]]Due to the rapid growth of technology, it is impossible to store all information in a si...
As more services move on to the web and more people use the cloud for storage of important informati...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Now-a-days, organizations are becoming more and more dependent on their information systems due to t...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In parallel file system we can disperse data over numerous nodes to permit simultaneous access by va...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
While using the growing usage of very network-attached storage systems, several works has focussed o...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
While using the growing use of very network-attached storage systems, several works has focussed on ...
[[abstract]]Due to the rapid growth of technology, it is impossible to store all information in a si...
As more services move on to the web and more people use the cloud for storage of important informati...
AbstractIn an open networking environment, a workstation usually needs to identify its legal users f...
[[abstract]]In an open networking environment, a workstation usually needs to identify its legal use...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Users are normally authenticated via their passwords in computer systems. Since people tend to choos...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Now-a-days, organizations are becoming more and more dependent on their information systems due to t...
With the advancement in Internet-based technologies, network applications are no longer just limited...
In parallel file system we can disperse data over numerous nodes to permit simultaneous access by va...
Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply...
As one of the most important trusted third-party-based authentication protocols, Kerberos is widely ...
While using the growing usage of very network-attached storage systems, several works has focussed o...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
While using the growing use of very network-attached storage systems, several works has focussed on ...
[[abstract]]Due to the rapid growth of technology, it is impossible to store all information in a si...
As more services move on to the web and more people use the cloud for storage of important informati...