Computer Science ›› 2009, Vol. 36 ›› Issue (2): 119-121.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: The Kerberos protocol developed by MIT has been widely used in the security authentication service for users and network connection. Based on the way of the communication with share-secret-key,Kerberos protocol protects the privacy and integrity of commun

Key words: Kerberos protocol, Security, Aauthentication, Deficiencies

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!