AKIT
English Eesti

authentication protocol

autentimisprotokoll

olemus
reeglistik, mis
- määrab sõnumivahetuse
enda identiteeti väitva poole ja
seda kontrolliva kaugpoole vahel
- võimaldab kaugpoolel kontrollida
väidetava identiteedi tõesust

ISO/IEC 29115:
olemi ja kontrollija vaheline
määratletud sõnumijärjend, mis
võimaldab kontrollijal olemit autentida

täpsemalt
https://www.auvik.com/media/blog/authentication-protocols/

https://iam.harvard.edu/resources/behind-login-screen

ülevaateid
http://gauss.ececs.uc.edu/Courses/c6053/lectures/PDF/authen.pdf

https://www.slideshare.net/guestfbf635/8-authentication-security-protocols

http://www.ijcaonline.org/research/volume131/number9/pandya-2015-ijca-907389.pdf

https://users.cs.fiu.edu/~carbunar/teaching/cen5079/cen5079.S.2019/slides/cen5079_5-auth.pdf

https://www.auvik.com/franklymsp/blog/authentication-protocols/

http://downloads.hindawi.com/journals/scn/2017/6562953.pdf

turvalisus
https://home.cyber.ee/~ahtbu/CDS2011/AleksandrPotapovSlides.pptx

http://www.infosecwriters.com/text_resources/pdf/SSotillo_EAP.pdf

http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1431&context=etd_projects

https://cwe.mitre.org/data/definitions/301.html

https://www.scmagazineuk.com/devastating-flaws-kerberos-authentication-protocol/article/1476950

https://itu.dk/people/rosg/paper/gaka_short.pdf

https://www.schneier.com/blog/archives/2019/04/vulnerabilities_7.html

https://digitalcommons.unf.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1698&context=etd

https://www.packetlabs.net/insecure-network-protocols/