共 50 条
- [1] Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 56 - 63
- [2] An Optimized Kerberos Authentication Protocol 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 508 - +
- [3] A Network Authentication Protocol Based on Kerberos INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
- [4] Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 153 - +
- [5] Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4604 - 4623
- [6] Kerberos based public key authentication protocol Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
- [7] Improved Authentication Model Based on Kerberos Protocol ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
- [8] A New Pre-authentication Protocol in Kerberos 5: Biometric Authentication 2015 IEEE RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES - RESEARCH, INNOVATION, AND VISION FOR THE FUTURE (RIVF), 2015, : 157 - 162
- [9] Modification on Kerberos authentication protocol in grid computing environment GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1079 - 1082
- [10] ONE THREE-POINT AUTHENTICATION PROTOCOL BASE ON KERBEROS PROTOCOL PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1245 - 1251