Standout Papers

Kerberos: an authentication service for computer networks 1994 2026 2004 2015 455
  1. Kerberos: an authentication service for computer networks (1994)
    Clifford Neuman, T. Ts'o IEEE Communications Magazine

Citation Impact

Citing Papers

Dos and don'ts of client authentication on the web
2001
ontext-aware security and secure context-awareness in ubiquitous computing environments
2006
Certificate-based access control for widely distributed resources
1999
MulVAL: a logic-based network security analyzer
2005 Standout
Obtaining Sensitive Data Through the Web: An Example of Design and Methods
2002
Participation Rates in Epidemiologic Studies
2007 Standout
Software-Defined Networking: A Comprehensive Survey
2014 Standout
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
2001 Standout
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
2011
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
2003 Standout
A taxonomy of Data Grids for distributed data sharing, management, and processing
2006
A pairwise key predistribution scheme for wireless sensor networks
2005
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
A survey on internet of vehicles: Applications, security issues & solutions
2019 Standout
Ciphertext-Policy Attribute-Based Encryption
2007 Standout
Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services
2013
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
The rise of “big data” on cloud computing: Review and open research issues
2014 Standout
Triboelectric Nanogenerator: A Foundation of the Energy for the New Era
2018 Standout
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
2014
Network-Induced Constraints in Networked Control Systems—A Survey
2012 Standout
Context Aware Computing for The Internet of Things: A Survey
2013 Standout
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012 Standout
The economics of information security investment
2002 Standout
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
2019 Standout
Fault-Tolerant and Scalable Key Management for Smart Grid
2011
Privacy-Preserving Layer over MapReduce on Cloud
2012
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
2017
A Survey on the Edge Computing for the Internet of Things
2017 Standout
Security for Grids
2005
A System Architecture for the Detection of Insider Attacks in Big Data Systems
2017
Networked Control System: Overview and Research Trends
2009 Standout
The Google file system
2003 Standout
20 years of Electronic Commerce Research
2021 Standout
User Differentiated Verifiable File Search on the Cloud
2016
Crowds
1998 Standout
BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices
2018 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
A method for taxonomy development and its application in information systems
2012 Standout
Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing
2017 Standout
Balancing cooperation and risk in intrusion detection
2000
Distributing trust with the Rampart toolkit
1996
Delegation logic
2003
An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
2018 Standout
Methods and limitations of security policy reconciliation
2006
A cost-effective, high-bandwidth storage architecture
1998
Power System Control Centers: Past, Present, and Future
2005 Standout
Enforcing privacy in e-commerce by balancing anonymity and trust
2011
Keystroke dynamics as a biometric for authentication
2000
How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey
2015
Anomaly-based network intrusion detection: Techniques, systems and challenges
2008 Standout
Long-lived authentication protocols for process control systems
2010
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
2004
Security for Industrial Communication Systems
2005

Works of T. Ts'o being referenced

Kerberos: an authentication service for computer networks
1994 Standout
Rankless by CCL
2026