Ticket Granting Ticket

Results: 61



#Item
1--  -- The Evolution of the Kerberos Authentication Service John T. Kohl

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
2Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
3MIT Kerberos and Cross Platform Interoperability with Microsoft and Java

MIT Kerberos and Cross Platform Interoperability with Microsoft and Java

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 02:00:34
4NIST PKI06: Integrating PKI and Kerberos

NIST PKI06: Integrating PKI and Kerberos

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-04-24 17:53:50
5Kerberos & SLURM using Auks - Tutorial - SLURM User Group Meeting 2012 | Matthieu Hautreux <>

Kerberos & SLURM using Auks - Tutorial - SLURM User Group Meeting 2012 | Matthieu Hautreux <>

Add to Reading List

Source URL: slurm.schedmd.com

Language: English - Date: 2012-09-26 12:56:48
6

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:23
7

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
8Inductive Proofs of Computational Secrecy  ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:17:14
9CDH 5 Security Guide  Important Notice (cCloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans contained in this document are tra

CDH 5 Security Guide Important Notice (cCloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans contained in this document are tra

Add to Reading List

Source URL: www.cloudera.com

Language: English - Date: 2015-04-18 20:00:36
10Configuring Hadoop Security with Cloudera Manager

Configuring Hadoop Security with Cloudera Manager

Add to Reading List

Source URL: www.cloudera.com

Language: English - Date: 2015-04-18 17:23:06