Login / Signup
Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures.
Alexander Oberle
Pedro Larbig
Ronald Marx
Frank G. Weber
Dirk Scheuermann
Daniel Fages
Fabien Thomas
Published in:
AINA (2016)
Keyphrases
</>
smart card
data management
database
security analysis
security protocols
business applications
critical infrastructure