Computer Science ›› 2009, Vol. 36 ›› Issue (2): 119-121.
Previous Articles Next Articles
Online:
Published:
Abstract: The Kerberos protocol developed by MIT has been widely used in the security authentication service for users and network connection. Based on the way of the communication with share-secret-key,Kerberos protocol protects the privacy and integrity of commun
Key words: Kerberos protocol, Security, Aauthentication, Deficiencies
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I2/119
Cited