Login / Signup
The Perils of Unauthenticated Encryption: Kerberos Version 4.
Tom Yu
Sam Hartman
Kenneth Raeburn
Published in:
NDSS (2004)
Keyphrases
</>
secret key
security analysis
encryption scheme
information systems
pseudorandom
smart card
key management
neural network
information retrieval