The performance analysis of public key cryptography-based authentication
Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authenticati...
Main Author: | Kaiqi Xiong |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2018-05-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/eai.15-5-2018.154770 |
Similar Items
-
Fast algorithms for public key cryptography
by: Han, Yong-Fei
Published: (1996) -
Namecoin as authentication for public-key cryptography
by: Melin, Tomas, et al.
Published: (2014) -
Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones
by: Chao Shen, et al.
Published: (2016-03-01) -
RSA, Public-Key Cryptography, and Authentication Protocols
by: Wright, Moriah E.
Published: (2012) -
Integrity, authentication and confidentiality in public-key cryptography
by: Ferradi, Houda
Published: (2016)