AKIT
English Eesti

authentication protocol

autentimisprotokoll

olemus
reeglistik, mis
- määrab sõnumivahetuse
------ enda identiteeti väitva poole ja
------ seda kontrolliva kaugpoole vahel
- võimaldab kaugpoolel kontrollida
väidetava identiteedi tõesust

ISO/IEC 29115:
olemi ja kontrollija vaheline määratletud sõnumijärjend, mis võimaldab kontrollijal sooritada olemi autentimise

täpsemalt
https://iam.harvard.edu/resources/behind-login-screen

https://www.auvik.com/media/blog/authentication-protocols/

http://help.fortinet.com/fos50hlp/54/Content/FortiOS/fortigate-authentication-54/Auth_Intro.htm

ülevaateid
http://gauss.ececs.uc.edu/Courses/c6053/lectures/PDF/authen.pdf

https://www.slideshare.net/guestfbf635/8-authentication-security-protocols

http://www.ijcaonline.org/research/volume131/number9/pandya-2015-ijca-907389.pdf

https://www.researchgate.net/publication/326553062_Authentication_Protocols_and_Techniques_A_Survey

https://www.researchgate.net/publication/220905191_Classification_of_Authentication_Protocols_A_Practical_Approach

turvalisus
https://home.cyber.ee/~ahtbu/CDS2011/AleksandrPotapovSlides.pptx

http://www.infosecwriters.com/text_resources/pdf/SSotillo_EAP.pdf

https://www.researchgate.net/publication/322349361_Vulnerability_Analysis_for_the_Authentication_Protocols_in_Trusted_Computing_Platforms_and_a_Proposed_Enhancement_of_the_OffPAD_Protocol

http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1431&context=etd_projects

https://cwe.mitre.org/data/definitions/301.html

https://www.scmagazineuk.com/devastating-flaws-kerberos-authentication-protocol/article/1476950

https://www.researchgate.net/publication/228981505_Analysis_of_a_Privacy_Vulnerability_in_the_OpenID_Authentication_Protocol

https://itu.dk/people/rosg/paper/gaka_short.pdf

https://www.schneier.com/blog/archives/2019/04/vulnerabilities_7.html