BIBLIOGRAFIA



[1] Garmam J. "Kerberos: The Definitive Guide" 2003

[2] Kerberos: The Network Authentication Protocol <www.web.mit.edu/kerberos/>

[3]  Bellovin,S.M. ; Merritt, M. "Limitations of Kerberos Authentication System "<http://www.securiteinfo.com/ebooks/palm/kerblimit.usenix.pdf>, USENIX, 91

[4] Neuman, B.C. ; Theodore Ts'o"Kerberos: An Authentication Service for Computer Networks", IEEE Communications Magazine, volume 32, número 9, 1994

    

Design downloaded from free website templates.