共 50 条
- [31] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +
- [32] Secure Authentication Using Biometric Templates in Kerberos 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
- [33] A lightweight authentication and authorization solution based on Kerberos PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 742 - 746
- [35] An Anonymous Authentication Mechanism Based on Kerberos and HIBC PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, : 392 - 396
- [36] A Browser-Based Kerberos Authentication Scheme COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 115 - +
- [37] Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING, 2017, 10140 : 47 - 66
- [39] A Kerberos-based authentication architecture for WLANS NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 43 - 55
- [40] A Token Authentication Solution for Hadoop Based on Kerberos Pre-Authentication 2014 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2014, : 354 - 360