Location based Kerberos Authentication Protocol

Abdelmajid, Nabih, Hossain, Alamgir, Shepherd, Simon and Mahmoud, Khaled (2010) Location based Kerberos Authentication Protocol. In: SocialCom 2010 : proceedings, the second IEEE International Conference on Social Computing : PASSAT 2010, the second IEEE International Conference on Privacy, Security, Risk, and Trust. IEEE, Piscataway, NJ, pp. 1099-1104. ISBN 978-1424484393

Full text not available from this repository. (Request a copy)
Official URL: http://dx.doi.org/10.1109/SocialCom.2010.163

Abstract

Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure, we propose to add the user's physical location as a new authentication factor into Kerberos protocol and call it N-Kerberos protocol, and we validate the new form of Kerberos (N-Kerberos).

Item Type: Book Section
Additional Information: SocialCom 2010 : proceedings, the second IEEE International Conference on Social Computing : PASSAT 2010, the second IEEE International Conference on Privacy, Security, Risk, and Trust : Minneapolis, Minnesota, USA, August 20-22, 2010.
Uncontrolled Keywords: N-Kerberos protocol , location-based Kerberos authentication protocol , message transfer , online communications
Subjects: G400 Computer Science
G900 Others in Mathematical and Computing Sciences
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: EPrint Services
Date Deposited: 08 Sep 2011 09:57
Last Modified: 31 Jul 2021 08:39
URI: http://nrl.northumbria.ac.uk/id/eprint/621

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics