BIBLIOGRAFIA
[1] Garmam J. "Kerberos: The Definitive Guide" 2003
[2] Kerberos: The Network Authentication Protocol <www.web.mit.edu/kerberos/>
[3] Bellovin,S.M. ; Merritt, M. "Limitations of Kerberos Authentication System "<http://www.securiteinfo.com/ebooks/palm/kerblimit.usenix.pdf>, USENIX, 91
[4] Neuman, B.C. ; Theodore Ts'o"Kerberos: An Authentication Service for Computer Networks", IEEE Communications Magazine, volume 32, número 9, 1994