[PDF][PDF] Information Security Risk Management Framework for University Computing Environment.

UK Singh, C Joshi - Int. J. Netw. Secur., 2017 - researchgate.net
Today's universities are on the forefront of technological advancement which makes
University'computing environment vulnerable because of its large open networks. This …

[PDF][PDF] A New Mutuel Kerberos Authentication Protocol for Distributed Systems.

Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz - Int. J. Netw. Secur., 2017 - academia.edu
In recent years, distributed systems, including cloud computing, are becoming increasingly
popular. They are based on traditional security mechanisms that focus on access control …

[PDF][PDF] A Lightweight Authentication Protocol in Smart Grid.

D Ghosh, C Li, C Yang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Smart grids allow automated meter readings and facilitate two-way communications
between the smart meters and utility control centers. As the smart grid becomes more …

Kerberos V5: Vulnerabilities and perspectives

Z Tbatou, A Asimi, Y Asimi… - 2015 Third World …, 2015 - ieeexplore.ieee.org
Kerberos V5 is one of the protocols that allow the user's single sign authentication without
sending the password. It's a distributed authentication system that many organizations adopt …

An improved password authentication scheme for smart card

CY Tsai, CS Pan, MS Hwang - … on Intelligent and Interactive Systems and …, 2017 - Springer
In recent times, Wei et al. proposed a secure smart card based on remote user password
authentication scheme. Their scheme is more secure than other schemes. In this article, we …

Formal Analysis and Improvement of Zero-Knowledge Password Authentication Protocol

IH Masri, S Siswantyo… - 2022 5th International …, 2022 - ieeexplore.ieee.org
The Internet as a communication medium has become a common thing in society.
Communicating via the Internet requires a communication service where users are obliged …

[PDF][PDF] Strong zero-knowledge Authentication based on the Session Keys (SASK)

Y Asimi, A Amghar, A Asimi, Y Sadqi - International Journal of …, 2015 - academia.edu
In this article, we propose a new symmetric communication system secured, founded upon
strong zero knowledge authentication protocol based on session keys (SASK). The users' …

Cryptanalysis of an efficient and secure smart card based password authentication scheme

CW Liu, CY Tsai, MS Hwang - … on Intelligent and Interactive Systems and …, 2017 - Springer
The user authentication scheme has been widely applied to verify the users' legality. In order
to enhance the security, the smart card has widely used in an authentication scheme …

Password authenticated key exchange and protected password change protocols

TY Chang, MS Hwang, CC Yang - Symmetry, 2017 - mdpi.com
In this paper, we propose new password authenticated key exchange (PAKE) and protected
password change (PPC) protocols without any symmetric or public-key cryptosystems. The …

[PDF][PDF] An Efficient Approach to Resolve Covert Channels.

MA Elsadig, YA Fadlalla - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The competitive edge of many companies and public trust in government institutions can
often depend on the security of the information held in their systems. Breaches of that …