Secure Password Authentication Procedure Utilizing Vectored Passwoed List in Safe Repository/University of Derby: School of Informatics
Material type:
TextPublication details: 2019Description: 42Summary: Abstract, Acknowledgements, Introduction, Related Work, Historical Background, Smart Card, Lightweight Directory Access Control, Active Directory, Kerberos, Literature Review, Smart Card, Lightweight Directory Access Protocol, Naming Model, Information Model, Functional Model, Security Model, Active Directory, Kerberos, Security Features and Threats, Security Over LDAP, Bind Operation, Unbind Operation, Threats over LDAP, Kerberos' Security Features and Threats, Kerberos Password Handling, Threats against Kerberos, Main in the Middle Attack, Dictionary - Brute Force Attack, Advanced Persistent Threat, Social Engineering, Overview of the Proposed Solution, Implementation, LDAP, Active Dictionary, Limitations, Eliminated Threats, Discussion, Future Work, Conclusion, Bibliography, Appendices, List of Abbreviations.
| Item type | Current library | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|
Διπλωματική εργασία
|
MC Athens Campus Library | COMP 2019 (28) (Browse shelf(Opens below)) | 1 | Available | 9780000085412 |
Browsing MC Athens Campus Library shelves Close shelf browser (Hides shelf browser)
Abstract, Acknowledgements, Introduction, Related Work, Historical Background, Smart Card, Lightweight Directory Access Control, Active Directory, Kerberos, Literature Review, Smart Card, Lightweight Directory Access Protocol, Naming Model, Information Model, Functional Model, Security Model, Active Directory, Kerberos, Security Features and Threats, Security Over LDAP, Bind Operation, Unbind Operation, Threats over LDAP, Kerberos' Security Features and Threats, Kerberos Password Handling, Threats against Kerberos, Main in the Middle Attack, Dictionary - Brute Force Attack, Advanced Persistent Threat, Social Engineering, Overview of the Proposed Solution, Implementation, LDAP, Active Dictionary, Limitations, Eliminated Threats, Discussion, Future Work, Conclusion, Bibliography, Appendices, List of Abbreviations.
There are no comments on this title.