9Bellovin S M, Merritt M. Limitations of the Kerberos Authentication Systems[J]. Computer Communication Review, 1990, 20(5): 119-132.
10Sirbu M A. Chuang J C I. Distributed Authentication in Kerberos Using Public Key Cryptography[C]//Proceedings of the 1997 Symposium on Network and Distributed System Security. Washington, D. C., USA: IEEE Computer Society, 1997.