Author:
Zhang Xiaoliang,Liu Heyu,Lu Yong,Sun Fuchun
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Miller SP, Neuman BC, Schiller JL, Saltzer JH (1987) Section E.2.1: Kerberos authentication and authorization system. MIT Project Athena, Cambridge, Massachusetts (21 Dec 1987)
2. Kohl J, Neuman S (1993) The Kerberos network authentication service. RFC 1510
3. Chang YF, Chang CC, Shiu CY (2005) An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper Syst Rev 39(1):70–84
4. Chadwick DW, Otenko O (2002) The PERMIS X. 509 role based privilege management infrastructure. In: Proceeding of SACMAT’ 02, pp 1–9
5. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theor 14(5):111–222
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献