1LIU Hongjun, LUO Ping, WANG Daoshun. A distributed expansible authentication model based on Kerberos[J]. Net- work andComputer Application, 2008, 31 (4): 472-486.
2ZHU Huiya, ZHU Yuesheng. A Kerberos-based UPNP exten- tion for secure home networks [C] //Proceedings of 4th Inter- national Conference on Computer Engineering and Technology, 2012: 104-108.
3DING Yu, ZHANG Ru, TIAN Yuan, et al. A new authenti- cation and key agreement based on Kerberos [C] //Procee- dings of IEEE International Conference on Information Theory and Information Security, 2011: 520-524.
4SU Yuan. Improvement of Kerberos protocol based on fuzzy logic [C] //Proceedings of IEEE International Conference on Information Theory and Information Security, 2011 : 396-399.
5Marin-lopez R, Pereniguez F, Lopez G, et al. Providing EAP-based Kerberos pre-authentication and advanced authori- zation for network federations [J]. Computer Standards and Interfaces, 2011, 33 (5): 494-504.
6CAO L C. Secure negotiation approach for shared-secret-key of Kerberos service [C] //Proceedings of the Third Interna- tional Conference on Artificial Intelligence and Computational Intelligence, 2011: 101-107.
7CAO L C. Enhancing distributed web security based on Ker- beros authentication service [C] //Proceedings of the Interna- tional Conference on Web Information Systems and Mining, 2010: 171-178.
8Hojabri M, RAO K V. Innovation in cloud computing: Im- plementation of Kerberos version5 in cloud computing in order to enhance the security issues[C] //International Conference on Information Communication and Embedded Systems, 2013: 452-456.
9ROH Dongyoung, HAHN Sanggeun. On the bit security of the weak Diffie-Hellman I:roblem [J].Information Processing Letters, 2010, 110 (19): 799-802.