共 19 条
[1]
Al-Janabi S. T. F., 2011, Proceedings of the 2011 4th International Conference on Developments in e-systems Engineering (DeSE 2011), P209, DOI 10.1109/DeSE.2011.16
[2]
Amin F., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P308, DOI 10.1109/ISIAS.2011.6122838
[3]
[Anonymous], 2012, FUTURE INFORM TECHNO
[4]
[Anonymous], 1988, P 12 ANN ACM S THEOR, DOI [DOI 10.1145/62212.62222, DOI 10.1145/62212]
[5]
[Anonymous], 2005, RFC 4120
[6]
Cormen T, 2001, INTRO ALGORITHMS, P767
[7]
Dahui Hu, 2010, 2010 IEEE International Conference on Information Theory and Information Security, P274, DOI 10.1109/ICITIS.2010.5689457
[8]
Downnard I, 2002, IEEE POTENTIALS, V21, P30, DOI 10.1109/MP.2002.1166623
[9]
EAP-Kerberos II: An Adaptation of Kerberos to EAP for Mutual Authentication
[J].
2008 8TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS, PROCEEDINGS,
2008,
:78-83
[10]
Security Analysis of the Kerberos protocol using BAN logic
[J].
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS,
2009,
:467-+