共 60 条
[1]
Abdelmajid N. T., 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P1099, DOI 10.1109/SocialCom.2010.163
[2]
Alexandrov O., 2018, WEAKNESS KERBEROS DE
[4]
Ancarani R, 2019, EXPLOITING UNCONSTRA
[5]
Strategies against replay attacks
[J].
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
1997,
:59-68
[6]
Babu M. M, 2014, I MANAGERS J CLOUD C, V1, P19, DOI [10.26634/jcc.1. 4.3191, DOI 10.26634/JCC.1.4.3191]
[7]
Decoder's Blog, 2019, DONK GUID RES BAS CO
[8]
Delpy B, 2014, ABUSING MICROSOFT KE
[9]
Dua G., 2013, INT J COMPUT NETW CO, V5, P59
[10]
Garcia C. G., 2017, 0XWORD