共 50 条
- [42] Practical attacks and improvements to an efficient radio frequency identification authentication protocol CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2069 - 2080
- [43] USING KERBEROS TO SECURE TLS PROTOCOL 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 237 - 240
- [44] A study on the peer-to-peer using Kerberos authentication Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 252 - 254
- [45] Securing Offline Delivery Services by Using Kerberos Authentication IEEE ACCESS, 2018, 6 : 40735 - 40746
- [46] An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 489 - 496
- [47] Research on Unified Authentication Model based on the Kerberos and SAML PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1053 - 1058
- [48] Research and realization of authentication technique based on OTP and Kerberos Eighth International Conference on High-Performance Computing in Asia-Pacific Region, Proceedings, 2005, : 409 - 413
- [49] Electrocardiogram-Kerberos Authentication Scheme for Secure Services 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 91 - 94
- [50] Distributed authentication in Kerberos using public key cryptography 1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 134 - 141