KOHI J. The use of encryption in kerberos for network authentication[A]. Proceedings Crypto' 89[C]. Berlin:Springer-Verlag, 1989. 19-24.
[3]
KOHI J, NEUMAN B, TS'O T. The evolution of the kerberos authentication service[DB/OL]. http//web. mit.edu/kerberos/www. papers, html, 1997-03-10/2003-01-20.