Inproceedings,

Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol.

, , , , , , , , , , and .
ACIS-ICIS, page 575-580. IEEE Computer Society, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews