Search

Your search keyword '"Kerberos"' showing total 910 results

Search Constraints

Start Over You searched for: Descriptor "Kerberos" Remove constraint Descriptor: "Kerberos"
910 results on '"Kerberos"'

Search Results

1. JWTAMH: JSON Web Tokens Based Authentication Mechanism for Hadoop.

2. Kerberos

3. An Automated Disruption-Tolerant Key Management Framework for Critical Systems

4. An Encrypting Electronic Payments Based on Kerberos Cryptography Protocol.

5. Enhancing the Security in Kerberos Protocol by Using a Random Number Generator Technique.

6. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

7. Training Scenario for Security Testing of the Kerberos Protocol

8. A Study on Kerberos and Graphical Password-Based Web Authentication Scheme

9. Health Data Security in a Big Data Environment

10. KerberSSIze Us: Providing Sovereignty to the People

11. Secure Data Education: Leveraging Big Data for Enhanced Academic Performance and Student Success in Educational Institutions

12. Kerberos Golden Ticket Attack

13. An Automated Disruption-Tolerant Key Management Framework for Critical Systems

14. Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure

15. Quantifying DDS-cerberus network control overhead.

16. Distribution of DDS-cerberus authenticated facial recognition streams.

17. Blockchain Based Authentication Framework for Kerberos Enabled Hadoop Clusters

18. Security Features in Hadoop—A Survey

19. A Three-Tier Authentication Scheme for Kerberized Hadoop Environment

20. Verification of RabbitMQ with Kerberos Using Timed Automata.

21. Distributed authentication framework for Hadoop based bigdata environment.

22. Active Directory Attacks—Steps, Types, and Signatures.

23. Improved Key Agreement Based Kerberos Protocol for M-Health Security.

26. Security Analysis and Improvement on Kerberos Authentication Protocol

28. Secure Key Distribution Prototype Based on Kerberos

30. On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey

31. Sandbox security model for Hadoop file system

32. Source Encryption Scheme in SDN Southbound

33. A Security Framework for Service-Oriented Architecture Based on Kerberos

34. Authentication Mechanism to Access Multiple-Domain Multimedia Data

35. Networks Key Distribution Protocols Using KPS

36. FPKIVS—A Stellar Approach to Voting Systems in India

37. KBID: Kerberos Bracelet Identification (Short Paper)

38. Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol

39. Enhanced Cloud Data Storage Security Using Hadoop.

41. Securing Offline Delivery Services by Using Kerberos Authentication

42. Napadi na metode autentikacije i autorizacije unutar Active Directory okruženja

43. TPM-Based Authentication Mechanism for Apache Hadoop

45. Distributed Authentication in the Cloud Computing Environment

48. Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series.

49. Distributed authentication system to access data in multiple secure domains.

50. Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers.

Catalog

Books, media, physical & digital resources