Author:
Nitin ,Chauhan Durg Singh,Sehgal Vivek Kumar,Mahanot Ankit,Singh Pallavi,Ahuja Sohit,Shrivastava Utkarsh,Rana Manisha,Punjabi Vineet,Vinay Shivam,Sharma Nakul
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Machine Learning: Image Authentication Based using 3-Level Security System;2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC);2024-01-27
2. SOAP messaging to provide quality of protection through Kerberos Authentication;2022 29th International Conference on Systems, Signals and Image Processing (IWSSIP);2022-06-01
3. Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol;2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS);2022-02-23
4. Engineering Authentication Process with Cloud Computing;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2019-03-03
5. Application of Time Synchronization Process to Kerberos;Procedia Computer Science;2016