Description
INTRODUCTION
Kerberos gets its name from Greek mythology. Cerberus, also known as Kerberos, was a three headed beast that guarded the Underworld and kept the living from entering the world of the dead. Kerberos protocol design began in the late 1980s at the Massachusetts Institute of Technology (MIT), as part of project Athena. It is a secure authentication mechanism designed for distributed severs, which assumes the network is unsafe. It enables a client and a server to mutually authenticate before establishing a connection.
Kerberos Seminar Report
Page Length : 20
Content :
- Abstract
- Introduction
- Motivation
- Benefits Of Using Kerberos
- Kerberos Version 4.
- Why Does Kerberos Do?
- Assumption Kerberos Makes.
- The High Level Details.
- Limitations Of Kerberos
- Conclusion
- References
Kerberos Presentation Report (PPT)
Page Length : 25
Content :
- Introduction
- History & Development
- Need
- Needham-Schroeder Protocol
- Working
- Applications
- Weakness
- Reference
Reviews
There are no reviews yet