共 50 条
- [22] What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 468 - 487
- [23] Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 56 - 63
- [24] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (02): : 833 - 847
- [26] 3-Level Secure Kerberos Authentication for Smart Home Systems Using IoT 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 262 - 268
- [27] Toward a secure Kerberos key exchange with smart cards International Journal of Information Security, 2014, 13 : 217 - 228
- [28] Performance analysis of the Kerberos protocol in a distributed environment SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 235 - 239
- [29] Kerberos based public key authentication protocol Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
- [30] Secure coprocessor integration with Kerberos V5 USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 113 - 128