I accept receiving promo codes and other educational info from this company.
Get My Code
Number of Pages 3
This research paper: A 3 page paper discussing the origins and use of the Kerberos authentication protocol. Based on secret-key encryption, Kerberos is much more secure than is public-key encryption approaches. Kerberos is much more useful in the Unix environment, however. Microsoft finally has addressed the interoperability issues that exist with using Kerberos on a Windows 2000 server, but only in such a way that placates current Kerberos users instead of taking full advantage of the protocol’s usefulness. Bibliography lists 5 sources.
File: CC6_KSitKerberos.rtf
Send me this paper »
« Back to Topic Listings