1Kohl, J., Neuman, C. The Kerberos network authentication service (V5). RFC1510, 1993. http://www.ietf.org/rfc/rfc1510.txt.
2Molva, R., Tsudik, G., van Herreweghen, E., et al. KryptoKnight authentication and key distribution system. In: Deswarte, Y., Eizenberg, G., Quisquater J.-J., eds. Proceedings of the 2nd European Symposium on Research in Computer Security (ESORICS'92). Lecture Notes in Computer Science 648, Springer-Verlag, 1992.155~174. http://www.laas.fr/~esorics/notices/ MTHZ92.html.
3Kaijser, P., Parker, T., Pinkas, D. SESAME: the solution to security for open distributed systems. Computer Communications, 1994,17(7):501~518.
4Fielding, R., Gettys, J., Mogul, J., et al. Hypertext transfer protocol-HTTP/1.1. RFC2068, 1997. http://www.w3.org/protocols/ rfc2616/rfc2616.html.
5Freier, A.O., Karlton, P., Kocher, P.C. The SSl protocol, version 3.0, Internet-draft. draft-freier-ssl-version3-02.txt, 1996. http://wp. netscape.com/eng/ssl3/ssl-toc.html.