共 50 条
- [1] On a Software Architecture of JUIT-Image Based Authentication System [J]. WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, : 35 - +
- [2] A Network Authentication Protocol Based on Kerberos [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
- [3] Security-Enhanced SDN Controller Based. Kerberos Authentication Protocol [J]. 2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 672 - 677
- [4] Security Analysis of the Kerberos protocol using BAN logic [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
- [5] Security analysis of Kerberos protocol based on SPEAR II [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
- [6] Kerberos based public key authentication protocol [J]. Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
- [7] A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security [J]. 2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 239 - 244
- [8] Improved Authentication Model Based on Kerberos Protocol [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
- [9] Security analysis of Kerberos protocol based on the strand space model [J]. Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914