Please use this identifier to cite or link to this item: http://148.72.244.84/xmlui/handle/xmlui/12951
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMohammad Najm Abdullah-
dc.contributor.authorMay T. Abdul-Hadi-
dc.contributor.authorHussain Mahdi-
dc.date.accessioned2024-03-19T15:04:49Z-
dc.date.available2024-03-19T15:04:49Z-
dc.date.issued2008-09-01-
dc.identifier.citationhttps://djes.info/index.php/djes/article/view/717en_US
dc.identifier.issn1999-8716-
dc.identifier.urihttp://148.72.244.84:8080/xmlui/handle/xmlui/12951-
dc.description.abstractAuthentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. A common methodology depends on the national standardizations is used to evaluate security of that authentication scenarios of Kerberos protocol.en_US
dc.language.isoenen_US
dc.publisherUniversity of Diyala – College of Engineeringen_US
dc.titleKERBEROS SECURITY EVALUATIONen_US
dc.typeArticleen_US
Appears in Collections:مجلة ديالى للعلوم الهندسية / Diyala Journal of Engineering Sciences (DJES)

Files in This Item:
File Description SizeFormat 
717.pdf198.08 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.