2008 8th International Conference on ITS Telecommunications 2008
DOI: 10.1109/itst.2008.4740231
|View full text |Cite
|
Sign up to set email alerts
|

EAP-Kerberos II: An adaptation of Kerberos to EAP for mutual authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Evaluating existing Kerberos implementations is essential for research, but the development of new Kerberos mechanisms is also equally important. Eum and Choi proposed a new authentication mechanism in Extensible Authentication Protocol (EAP) named EAP-Kerberos II [23]. This protocol mitigated three security concerns of wireless local area networks (WLANs) for an 802.11 network: rogue access points (APs), unprotected messages, and message delay.…”
Section: Kerberos Evaluationsmentioning
confidence: 99%
“…Evaluating existing Kerberos implementations is essential for research, but the development of new Kerberos mechanisms is also equally important. Eum and Choi proposed a new authentication mechanism in Extensible Authentication Protocol (EAP) named EAP-Kerberos II [23]. This protocol mitigated three security concerns of wireless local area networks (WLANs) for an 802.11 network: rogue access points (APs), unprotected messages, and message delay.…”
Section: Kerberos Evaluationsmentioning
confidence: 99%
“…Kerberos is used as an authentication server (AS) to provide a trusted computing service and is applied in Windows, Linux, Mac OS, and Solaris. It is also used in cloud computing , wireless networks , and wireless sensor networks . However, it suffers from common password‐guessing attacks because it is based on the password‐to‐key mechanism in which the shared key between the client and Kerberos server is derived from the client's password.…”
Section: Introductionmentioning
confidence: 99%