Journal of Information Security

Vol.1 No.2(2010), Paper ID 2951, 12 pages

DOI:10.4236/jis.2010.12007

 

Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V

 

Yongjian Li, Jun Pang

 

 

Copyright © 2010 Yongjian Li, Jun Pang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Y. Li and J. Pang, "Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 56-67. doi: 10.4236/jis.2010.12007.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.