slugKerberos Authentication Protocol Modeling Using NUSMV Model
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 5
Abstract
Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protocol Kerberos protocol etc. The aim of this paper is to verify and formalize the Kerberos protocol using NuSMV model checker. The protocol v e r s i o n used in this paper is Kerberos Authentication Protocol. The paper suggests CTL specifications for authentication, secrecy an d i n t e g r i t y . We have also proposed an approach to identify presence of intruder in the system.
Authors and Affiliations
Brajesh Patel and Priyanka Dubey
Macro Economic Assessment of Taxes on Petro Products in India: A Case for Tax Rate Rationalization and Fiscal Consolidation
Tax on Petroleum products is a significant fiscal instrument. Besides being items of revenue receipt for Government exchequer, both at States and at Centre; taxes on petroleum products become cost items to producers. T...
slugSHORTEST PATH ALGORITHMS: A COMPARATIVE ANALYSIS
Now a days routing is the vital problem while forwarding information from one node to another node in communication networks. Routing in today’s network is accomplished by shortest path routing algorithm. There are dif...
slugPerformance Evaluation of On-demand AODV and DSR Routing Protocols in Mobile Ad-hoc Network
Wireless networks history began in the period of 1970s and the awareness has been increasing ever since. Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes, which build network dynamically, and does...
Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication
In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor...
Potential application of waste Fly Ash in Agriculture & Construction: preventive measures to protect Health & Environment
The present research paper deals with the problem associated with fly ash on health & environment & preventing measure to minimize pollution by promising application of fly ash in varied sector such as agriculture, dev...