@dblp

Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures.

, , , , , , and . AINA, page 800-807. IEEE Computer Society, (2016)

Links and resources

Tags