共 50 条
- [1] On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey IEEE ACCESS, 2021, 9 : 109289 - 109319
- [2] Attacking Tor through Unpopular Ports 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 33 - 38
- [3] Attacking the Network Time Protocol 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [4] On the security of the Tor authentication protocol Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
- [5] Beyond TOR: The TrueNyms Protocol SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 68 - 84
- [7] The Arvy Distributed Directory Protocol SPAA'19: PROCEEDINGS OF THE 31ST ACM SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURESS, 2019, 2019, : 225 - 235
- [8] Attacking and Repairing the Improved ModOnions Protocol INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 258 - +
- [9] Deriving, attacking and defending the GDOI protocol COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 53 - 72
- [10] Effective Attacks in the Tor Authentication Protocol NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 81 - 86