"Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V"
written by Yongjian Li, Jun Pang,
published by Journal of Information Security, Vol.1 No.2, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Nonce-based Kerberos is a Secure Delegated AKE Protocol
IACR Cryptology ePrint Archive, 2016
[2] Secure time information in the internet key exchange protocol
Annales UMCS, Informatica, 2011