Login / Signup

Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures.

Alexander OberlePedro LarbigRonald MarxFrank G. WeberDirk ScheuermannDaniel FagesFabien Thomas
Published in: AINA (2016)
Keyphrases
  • smart card
  • data management
  • database
  • security analysis
  • security protocols
  • business applications
  • critical infrastructure