security_white_paper.doc
Chapter 15 Computer Security Techniques Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E.
Network Security: Kerberos Tuomas Aura. 2 Outline Kerberos authentication Kerberos in Windows domains.
Using Covert Communication to Enhance Systems Security and User Authentication
Jips v07 no1_paper17
Jips v07 no1_paper17_3
Patricio Maller: Autenticación biométrica desde la perspectiva de los usuarios.
Lecture12.pdf
Network Security: Kerberos Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2014.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.