Login / Signup
Secure Coprocessor Integration with Kerberos V5.
Naomaru Itoi
Published in:
USENIX Security Symposium (2000)
Keyphrases
</>
authentication protocol
security analysis
key distribution
password authentication
secret key
authentication mechanism
authentication scheme
key exchange protocol
database systems
distributed computing
security requirements
smart card
similarity search
instruction set
key exchange
heterogeneous platforms
database