By Topic

Security Analysis of the Kerberos Protocol Using BAN Logic

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kai Fan ; Minist. of Edu. Key Lab. of Comput. Network & Inf. Security, Xidian Univ., Xi'an, China ; Hui Li ; Yue Wang

Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.

Published in:

Information Assurance and Security, 2009. IAS '09. Fifth International Conference on  (Volume:2 )

Date of Conference:

18-20 Aug. 2009