Ticket Granting Ticket

Results: 61



#Item
11Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
12Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Add to Reading List

Source URL: andreas.schmidt.novalyst.de

Language: English - Date: 2009-01-06 04:23:23
13Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
14draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
15A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 18:04:53
16Terms and Conditions of Priority Ticket Offer[removed]In consideration of Cricket Australia granting you, as an Eligible ACF Member, the opportunity to participate in the Priority Access Ticket Offer for the[removed]inte

Terms and Conditions of Priority Ticket Offer[removed]In consideration of Cricket Australia granting you, as an Eligible ACF Member, the opportunity to participate in the Priority Access Ticket Offer for the[removed]inte

Add to Reading List

Source URL: media.ticketmaster.com

Language: English - Date: 2014-07-20 19:20:23
17ALBURY - WODONGA CLAY TARGET CLUB Inc. PROGRAM 2015 V2  DTL, SKEET, SPORTING

ALBURY - WODONGA CLAY TARGET CLUB Inc. PROGRAM 2015 V2 DTL, SKEET, SPORTING

Add to Reading List

Source URL: www.awctc.com

Language: English - Date: 2014-12-16 20:42:33
181  Interoperability with Windows using CIFS File Sharing with Kerberos Authentication Jeff Layton

1 Interoperability with Windows using CIFS File Sharing with Kerberos Authentication Jeff Layton

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 13:16:25
19Building a Better Grid Authentication System with Kerberos David McBride <dwm@doc.ic.ac.uk> Department of Computing, Imperial College  There are issues with GSI

Building a Better Grid Authentication System with Kerberos David McBride Department of Computing, Imperial College There are issues with GSI

Add to Reading List

Source URL: www.allhands.org.uk

Language: English - Date: 2010-04-07 12:01:06
20ATI Courses Model Based Classification Using Multi-Ping Data

ATI Courses Model Based Classification Using Multi-Ping Data

Add to Reading List

Source URL: aticourses.com

Language: English - Date: 2015-03-30 16:39:43