共 50 条
- [32] Electrocardiogram-Kerberos Authentication Scheme for Secure Services 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 91 - 94
- [33] Secure Secret-Key Management of Kerberos Service EMERGING RESEARCH IN ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, 2011, 237 : 76 - 83
- [34] Kerberos Secured Address Resolution Protocol (KARP) 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 210 - 215
- [35] Study on Kerberos Protocol Based on Fuzzy Control 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 290 - 292
- [36] Further Improvements to the Kerberos Timed Authentication Protocol NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 549 - 554
- [37] Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ? 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 879 - 884
- [38] Improved Authentication Model Based on Kerberos Protocol ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
- [39] Training Scenario for Security Testing of the Kerberos Protocol ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 56 - 67