Preview
Unable to display preview. Download preview PDF.
References
T. Hardjono and J. Seberry, “Authentication via multi-service tickets in the kuperee server,” in Computer Security — ESORICS'94: Proceedings of the Third European Symposium on Research in Computer Security (D. Gollmann, ed.), vol. 875 of LNCS, pp. 143–160, Springer-Verlag, 1994.
Y. Zheng and J. Seberry, “Immunizing public key cryptosystems against chosen ciphertext attacks,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 715–724, 1993.
T. Hardjono, “Kuperee simplified,” Technical Report Preprint 95-5, Centre for Computer Security Research, Computer Science Department, University of Wollongong, December 1994.
Y. Ding and P. Horster, “Why the kuperee authentication system fails,” Operating Systems Review, vol. 30, no. 2, pp. 42–51, 1996.
J. G. Steiner, C. Neuman, and J. I. Schiller, “Kerberos: an authentication service for open network systems,” in Proceedings of the 1988 USENIX Winter Conference, (Dallas, TX), pp. 191–202, 1988.
S. M. Bellovin and M. Merritt, “Limitations of the Kerberos authentication system,” Computer Communications Review, vol. 20, no. 5, pp. 119–132, 1990.
J. T. Kohl, “The evolution of the kerberos authentication service,” in Proceedings of the Spring 1991 EurOpen Conference, (TromsØ, Norway), 1991.
L. Gong, “Increasing availability and security of an authentication service,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657–662, 1993.
A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the National Computer Conference, AFIPS Conference Proceedings, Vol. 48, pp. 313–317, 1979.
R. M. Needham and M. D. Schroeder, “Using encryption for authentication in a large network of computers,” Communications of the ACM, vol. 21, no. 12, pp. 993–999, 1978.
R. M. Needham and M. D. Schroeder, “Authentication revisited,” Operating Systems Review, vol. 21, no. 1, p. 7, 1987.
T. Y. C. Woo and S. S. Lam, “Authentication for distributed systems,” IEEE Computer, vol. 25, pp. 39–52, January 1992.
W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644–654, 1976.
T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469–472, 1985.
Y. Zheng, T. Hardjono, and J. Seberry, “Reusing shares in secret sharing schemes,” The Computer Journal, vol. 17, pp. 199–205, March 1994.
G. J. Simmons, “An introduction to shared secret and/or shared control schemes and their application,” in Contemporary Cryptology (G. J. Simmons, ed.), pp. 441–497, IEEE Press, 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hardjono, T., Seberry, J. (1996). Replicating the Kuperee authentication server for increased security and reliability. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023283
Download citation
DOI: https://doi.org/10.1007/BFb0023283
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive