authentication protocol
autentimisprotokoll
olemus
reeglistik, mis
- määrab sõnumivahetuse
enda identiteeti väitva poole ja
seda kontrolliva kaugpoole vahel
- võimaldab kaugpoolel kontrollida
väidetava identiteedi tõesust
ISO/IEC 29115:
olemi ja kontrollija vaheline
määratletud sõnumijärjend, mis
võimaldab kontrollijal olemit autentida
täpsemalt
https://www.auvik.com/media/blog/authentication-protocols/
https://iam.harvard.edu/resources/behind-login-screen
ülevaateid
http://gauss.ececs.uc.edu/Courses/c6053/lectures/PDF/authen.pdf
https://www.slideshare.net/guestfbf635/8-authentication-security-protocols
http://www.ijcaonline.org/research/volume131/number9/pandya-2015-ijca-907389.pdf
https://users.cs.fiu.edu/~carbunar/teaching/cen5079/cen5079.S.2019/slides/cen5079_5-auth.pdf
https://www.auvik.com/franklymsp/blog/authentication-protocols/
http://downloads.hindawi.com/journals/scn/2017/6562953.pdf
turvalisus
https://home.cyber.ee/~ahtbu/CDS2011/AleksandrPotapovSlides.pptx
http://www.infosecwriters.com/text_resources/pdf/SSotillo_EAP.pdf
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1431&context=etd_projects
https://cwe.mitre.org/data/definitions/301.html
https://www.scmagazineuk.com/devastating-flaws-kerberos-authentication-protocol/article/1476950
https://itu.dk/people/rosg/paper/gaka_short.pdf
https://www.schneier.com/blog/archives/2019/04/vulnerabilities_7.html
https://digitalcommons.unf.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1698&context=etd
https://www.packetlabs.net/insecure-network-protocols/