A Modified Approach to KERBEROS Authentication Protocol using Improved BLOWFISH Scheme

Download Now
Provided by: International Journal on Computer Science and Technology (IJCST)
Topic: Security
Format: PDF
An authentication mechanism is the most basic requirement for developing a highly secure environment. Authentication itself means confirming the truth of data. Since the information stored on the computer which is transmitted over internet need to ensure security and measuring safety to information, so without the authors' awareness, the intruders can attempt to obtain and gain control over the system to access secure confidential information by using most common method like DoS Attack, Backdoor, Trojan horse, Packet Sniffing, etc. So there must not be any compromise in securing their resources.
Download Now

Find By Topic