共 50 条
- [41] A Network Authentication Protocol Based on Kerberos [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
- [42] Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal [J]. PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 153 - +
- [43] Synopsis of Security: Using Kerberos Method to Secure File Transfer Sessions [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1016 - 1020
- [45] Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif [J]. Applied Sciences (Switzerland), 2024, 14 (21):
- [46] Security Proof of KerNeeS Protocol Based on Logic of Events [J]. THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 61 - 79
- [47] Security of Data Transmission Using Logic Gates and Crypt Analysis [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 101 - 105
- [48] An approach for network security analysis using logic exploitation graph [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 761 - +
- [49] A logic programming based framework for security protocol verification [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2008, 4994 : 638 - 643
- [50] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (02): : 833 - 847