{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T01:10:04Z","timestamp":1745197804700,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_16","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T02:04:18Z","timestamp":1353031458000},"page":"206-219","source":"Crossref","is-referenced-by-count":0,"title":["The Performance of Public Key-Based Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Kaiqi","family":"Xiong","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"16_CR1","first-page":"1","volume":"7","author":"Y. Amir","year":"2004","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the performance of group key agreement protocols. ACM Transactions on Information and Systems Security (TISSEC)\u00a07(3), 1\u201332 (2004)","journal-title":"ACM Transactions on Information and Systems Security (TISSEC)"},{"issue":"5","key":"16_CR2","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TPDS.2004.1278104","volume":"15","author":"Y. Amir","year":"2004","unstructured":"Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems\u00a015(5), 468\u2013480 (2004)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Al-Janabi, S.: Public-Key Cryptography Enabled Kerberos Authentication. In: Developments in E-systems Engineering, DeSE (2011)","DOI":"10.1109\/DeSE.2011.16"},{"key":"16_CR4","unstructured":"Altman, J.: NIST PKI 2006: Integrating PKI and Kerberos (2007), http:\/\/www.secure-endpoints.com\/talks\/nist-pki-06-kerberos.pdf"},{"key":"16_CR5","unstructured":"Altman, J.: Personal communication (2007)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Barry, D.: Web Services and Service-Oriented Architecture: Your Road Map to Emerging IT. Morgan Kaufmann (2003)","DOI":"10.1016\/B978-155860906-8\/50013-5"},{"key":"16_CR7","unstructured":"Bruell, S., Balbo, G.: Computerational Algorithms for Closed Queueing Netowrks. In: Denning, P.J. (ed.) Science Library. Elsevier North Holland, Inc., New York (1980)"},{"key":"16_CR8","unstructured":"Buckley, S.: MIT Kerberos Consortium Proposal to Sponsors (2008), http:\/\/www.kerberos.org\/join\/overview.pdf"},{"key":"16_CR9","unstructured":"CITI. kx509 and KCA (2006), http:\/\/www.citi.umich.edu\/projects\/kerb_pki\/"},{"key":"16_CR10","unstructured":"Dai, W.: Crypto++ 3.1 benchmarks (2007), http:\/\/www.eskimo.com\/~weidai\/benchmark.html"},{"key":"16_CR11","unstructured":"Davis, D.: Kerberos plus RSA for world wide web security. In: Proceedings of the First USENIX UNIX Workshop on Electronic Commerce, New York City, New York (July 1995)"},{"key":"16_CR12","unstructured":"Davis, D.: Compliance defects in public-key cryptography. In: Proceedings of the Sixth USENIX UNIX Security Symposium (USENIX Security 1996), San Jose, California (July 1996)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Dongara, P., Vijaykumar, T.N.: Accelerating private-key cryptography via multithreading on symmetric multiprocessors. In: Proc. IEEE Int\u2019l Symp. Performance Analysis of Systems and Software (ISPASS 2003), pp. 58\u201369. IEEE Press (2003)","DOI":"10.1109\/ISPASS.2003.1190233"},{"key":"16_CR14","unstructured":"Doster, W., Watts, M., Hyde, D.: The KX.509 Protocol (2001), http:\/\/www.citi.umich.edu\/techreports\/reports\/citi-tr-01-2.pdf"},{"key":"16_CR15","unstructured":"Garman, J.: Kerberos: The Definitive Guide. O\u2019Reilly (2003)"},{"key":"16_CR16","unstructured":"Kirsal, Y., Gemikonakli, O.: Further Improvements to the Kerberos Timed Authentication Protocol. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M. (eds.) Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics. Springer (2008)"},{"key":"16_CR17","unstructured":"Liang, W., Wang, W.: A Quantitative study of authentication and QoS in Wireless IP Networks. In: Proceedings of the 24th IEEE Conference on Computer Communications, INFOCOM (2005)"},{"key":"16_CR18","unstructured":"Hardjono, T.: Kerberos on the Web: Update. MIT Kerberos Consortium (December 2005), http:\/\/www.kerberos.org\/events\/Board-3-30-09\/3-hardjono-kerbweb.pdf"},{"key":"16_CR19","unstructured":"Heimdal. PKCROSS for Heimdal (April 2008), http:\/\/www.taca.jp\/krb-cross-realm\/pkcross-heimdal.html"},{"key":"16_CR20","unstructured":"Heimdal. Initial version of PKCROSS Implementation. Heimdal Discussion Mailing List (April 2008), http:\/\/www.stacken.kth.se\/lists\/heimdal-discuss\/2008-04\/msg00004.html"},{"key":"16_CR21","unstructured":"Harbitter, A., Menasce, D.: Perofrmance of public-key-enabled Kerberos authentication in large networks. In: Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland, California (2001)"},{"key":"16_CR22","unstructured":"Hur, M., Tung, B., Ryutov, T., Neuman, C., Medvinsky, A., Tsudik, G., Sommerfeld, B.: Public key cryptography for cross-realm authentication in Kerberos (PKCROSS) (May 2001), http:\/\/tools.ietf.org\/html\/draft-ietf-cat-kerberos-pk-cross-07"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Kaufman, C.: Internet Key Exchange (IKEv2) Protocol (December 2005), http:\/\/www.ietf.org\/rfc\/rfc4306.txt","DOI":"10.17487\/rfc4306"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: RFC 1510: The Kerberos network authentication service, v5 (1993), http:\/\/rfc.net\/rfc1510.html","DOI":"10.17487\/rfc1510"},{"key":"16_CR25","unstructured":"KX.509. KX.509 Source (2007), http:\/\/kx509.cvs.sourceforge.net\/kx509\/"},{"key":"16_CR26","unstructured":"Medvinsky, A., Hur, M., Neuman, C.: Public key utilizing tickets for application servers (PKTAPP) (January 1997), http:\/\/tools.ietf.org\/html\/draft-ietf-cat-pktapp-00"},{"key":"16_CR27","unstructured":"The MIT Kerberos Consortium. Proposal for corporate sponsors (2007), http:\/\/www.kerberos.org\/join\/proposal.pdf"},{"key":"16_CR28","unstructured":"Muntz, R., Chandy, K., Baskett, F., Palacios, F.: Open, closed, and mixed networks of queues with different classes of customers. Journal of the ACM (April 1975)"},{"key":"16_CR29","unstructured":"Neuman, B., Tung, B., Way, J., Trostle, J.: Public key cryptography for initial authentication in Kerberos servers (PKINIT 2002) (October 2002), http:\/\/ietf.org\/internet-drafts\/draft-ietf-cat-Kerberos-pk-init-02.txt"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Patel, A., Leung, K., Khalil, M., Akhtar, H.: Authentication protocol for mobile IPv6 (2006), http:\/\/www.rfc-editor.org\/rfc\/rfc4285.txt","DOI":"10.17487\/rfc4285"},{"key":"16_CR31","unstructured":"Pathan, K., Deshmukh, S., Deshmukh, R.: Kerberos Authentication System?A Public Key Extension. International Journal of Recent Trends in Engineering (May 2009)"},{"key":"16_CR32","unstructured":"Sirbu, M., Chuang, J.: Distributed authentication in Kerberos using public key cryptography. In: IEEE Symposium On Network and Distributed System Security, NDSS 1997 (1997)"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996 (1996)","DOI":"10.1145\/238168.238182"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Zhu, L., Tung, B.: RFC 4556: Public key cryptography for initial authentication in Kerberos (PKINIT) (June 2006), http:\/\/www.ietf.org\/rfc\/rfc4556.txt","DOI":"10.17487\/rfc4556"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:42:15Z","timestamp":1745196135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}