Number | Name | Date | Kind |
---|---|---|---|
5442749 | Northcutt et al. | Aug 1995 | A |
5761309 | Ohashi et al. | Jun 1998 | A |
5774551 | Wu et al. | Jun 1998 | A |
5841970 | Tabuki | Nov 1998 | A |
5845070 | Ikudome | Dec 1998 | A |
5944824 | He | Aug 1999 | A |
6006328 | Drake | Dec 1999 | A |
6023684 | Pearson | Feb 2000 | A |
6073242 | Hardy et al. | Jun 2000 | A |
6173400 | Perlman et al. | Jan 2001 | B1 |
6219790 | Lloyd et al. | Apr 2001 | B1 |
6223289 | Wall et al. | Apr 2001 | B1 |
6226744 | Murphy et al. | May 2001 | B1 |
6226751 | Arrow et al. | May 2001 | B1 |
6226752 | Gupta et al. | May 2001 | B1 |
6233565 | Lewis et al. | May 2001 | B1 |
6275944 | Kao et al. | Aug 2001 | B1 |
6289462 | McNabb et al. | Sep 2001 | B1 |
6317830 | Stolz | Nov 2001 | B1 |
6385596 | Wiser et al. | May 2002 | B1 |
6470397 | Shah et al. | Oct 2002 | B1 |
Entry |
---|
Neuman, B. Clifford and Ts'o, Theodore, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications Magazine, Sep. 1994, pp. 33-38, vol. 32, No. 9. |
Samar, Vipin and Lai, Charlie, “Making Login Services Independent of Authentication Technologies,” 3rd ACM Conference on Computer and Communications Security, Mar. 1996. |