1SCHNEIER B. Applied Cryptography: Protocols, algorithms, and source code in C[ M]. 2nd Ed.吴世忠,祝世雄,张文政,等译.北京:机械工业出版社,2000:368-370.
2DIFFIE W, HELLMAN M . New directions in cryptography[ J]. IEEE Transactions on Informantion Theory, 1976, 22(6) : 644 - 654.
3HARBITTER DA.NIEL A H, MENASCCE A. Performane of public- key-enabled Kerberos authentication in large networks[ C]//2001 IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 2001.