Implementing Kerberos in Distributed Systems
暂无分享,去创建一个
[1] Clifford Neuman,et al. Public Key Cryptography for Cross-Realm Authentication in Kerberos , 2001 .
[2] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[3] Carlisle M. Adams. The Simple Public-Key GSS-API Mechanism (SPKM) , 1996, RFC.
[4] Ari Medvinsky,et al. Addition of Kerberos Cipher Suites to Transport Layer Security (TLS) , 1999, RFC.
[5] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[6] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[7] John Linn,et al. The Kerberos Version 5 GSS-API Mechanism , 1996, RFC.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Jack Kabat,et al. Generic Security Service API Version 2 : Java Bindings , 2000, RFC.