1.
D. P. Sumalatha and D. C. K. Priya, "A Prototype Implementation for Public Key Infrastructure Based on Transport Layer Security," International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 6, pp. 83-88, September - October 2017.
2.
R. Abobeah, M. Ezz, and H. Harb, "Public-key cryptography techniques evaluation," International Journal of Computer Networks and Applications, vol. 2, pp. 64-75, 2015.
3.
S. Sharma, "Cryptography: An art of writing a secret code," International Journal of Computer Science & Technology, vol. 8, pp. 26-30, 2017.
4.
K. H. K. Alibraheemi, "Robust Biometrics-Based Authentication Scheme for Cryptographic Keys Distribution," International Journal of Applied Engineering Research, vol. 13, pp. 1415-1420, 2018.
5.
W. Stallings, Cryptography and Network Security: Principles and Practice: Pearson Prentice Hall, 2017.
6.
Jincy Sebastian and S. Jose, "Implementation of Two-Server Password-Based Authentication," International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, pp. 11608-11614, 2015.
7.
M. Khalifa, "Enhanced Kerberos Authentication For Distributed Environment Using Two Phases Security," An international journal of advanced computer technology, vol. 6, pp. 2323-2329, 2017.
8.
S. Arora and M. Hussain, "Secure session key sharing using symmetric key cryptography," in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018, pp. 850-855.
9.
S. Budiyanto, G. B. Santosa, and F. R. I. Mariati, "Upgrading the S-NCI Key Establishment Protocol Scheme to be Secure and Applicable," in IOP Conference Series: Materials Science and Engineering, 2018, p. 012002.
10.
M. Narendra and S. S. Raja, "A Study of Using Authenticated Key Exchange Protocols to Boost The Efficiency of Parallel Network File System," Journal of Critical Reviews, vol. 7, pp. 1883-1890, 2020.
11.
M. D. Nath and S. Karforma, "Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction," International Journal of Computer Sciences and Engineering, vol. 6, pp. 1-5, 2018.
12.
Z. Tbatou, A. Asimi, Y. Asimi, Y. Sadqi, and A. Guezzaz, "A New Mutuel Kerberos Authentication Protocol for Distributed Systems," Int. J. Netw. Secur., vol. 19, pp. 889-898, 2017.
13.
L. Wu, J. Fan, Y. Xie, and J. Wang, "An improved authentication and key agreement scheme for session initial protocol," KSII Transactions on Internet and Information Systems (TIIS), vol. 11, pp. 4025-4042, 2017.
14.
K. Bakare, S. Junaidu, and M. Ahmed, "Improved Secure Biometric Authentication Protocol," International Journal of Applied Information Systems, vol. 12, pp. 49-56, 2020.
15.
T. A. Khaleel, "Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments," Engineering and Technology Journal, vol. 39, pp. 41-52, 2021.
16.
Z. Tbatou, A. Asimi, C. E. Balmany, and Y. Asimi, "A Novel Architecture of a Strong and Mutual Authentication Protocol for Distributed Systems," Engineering Letters, vol. 28, 2020.
17.
P. Bhadle, S. Gugale, S. Trar, H. Kaur, and S. Salve, "Kerberos Authentication System using Public key Encryption," International Journal of Computer Science and Information Technologies, vol. 5, pp. 1930-1933, 2014.
18.
J. Sun and Z. Gao, "Improved mobile application security mechanism based on Kerberos," in Proceedings of 2019 4th international workshop on materials engineering and computer sciences, 2019, pp. 108-112.
19.
J. G. Dastidar, "An Authentication Protocol based on Kerberos," Journal of Engineering Research and Application, vol. 7, pp. 70-74, 2017.
20.
A. Jesudoss and N. Subramaniam, "Enhanced Kerberos authentication for distributed environment," Journal of Theoretical and Applied Information Technology (JTAIT), vol. 69, pp. 368-374, 2014.
21.
H. Saputra and Z. Zhao, "Long term key management architecture for SCADA systems," in 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, pp. 314-319.
22.
A. Yasser, Alahmadi and N. Saleh, Alassali, "An Improved Key Distribution Protocol Using Symmetric Key Cryptography," International Journal of Computer Sciences and Engineering (IJCSE), vol. 8, pp. 21-26, 2020.
23.
G. Dua, N. Gautam, D. Sharma, and A. Arora, "Replay attack prevention in Kerberos authentication protocol using triple password," International Journal of Computer Networks & Communications (IJCNC), vol. 2, pp. 59-70, 2013.
24.
P. Shalini and M. Kushwaha, "Mutual Authentication and Secure Key Distribution in Distributed Computing Environment," International Journal of Advanced Research in Engineering and Technology (IJARET), vol. 11, pp. 378-390, 2020.
25.
V. Lozupone, "Analyze encryption and public key infrastructure (PKI)," International Journal of Information Management, vol. 38, pp. 42-44, 2018.
26.
R. Amin, P. Lohani, M. Ekka, S. Chourasia, and S. Vollala, "An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation," Computers & Electrical Engineering, vol. 82, p. 106554, 2020.
27.
M. Safkhani, N. Bagheri, and M. Shariat, "On the security of rotation operation based ultra-lightweight authentication protocols for RFID systems," Future Internet, vol. 10, pp. 1-15, 2018.
28.
M. H. Alzuwaini and A. A. Yassin, "An Efficient Mechanism to Prevent the Phishing Attacks," Iraqi Journal for Electrical & Electronic Engineering, vol. 17, 2021.
29.
S. Bojjagani, D. D. Brabin, and P. V. Rao, "PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification," Procedia Computer Science, vol. 171, pp. 1110-1119, 2020.
30.
E. Munivel and A. Kannammal, "New authentication scheme to secure against the phishing attack in the mobile cloud computing," Security and Communication Networks, vol. 2019, pp. 1-11, 2019.