Kerberos is one of the solutions for network security problems since it provides strong secret key cryptography over the insecure networks. Through the Kerberos authentication protocol, a client can prove its identity...
supported by the National Science and Technology Support Program under Grant No.2012BAH46B02 and 2012BAH45B01;the National High Technology Research and Development Program(863 Program) of China under Grant No.2011AA010703;the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030200
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation...
supported by the National Natural Science Foundation of China under Grant No. 61179072;the Civil Aviation Science Foundation of China
An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system d...
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani...