3Jaiganesh M,Ramdoss B.Security Management in Kerberos V5 for GSM Network[C]//Proceedings of International Conference on Computing,Communication and Networking,December 18-20,2008,St.Thomas,USA.Washington D.C.,USA:IEEE Press,2008:682-688.
4El-Emam E,Koutb M,Kelash H,et al.An Optimized Kerberos Authentication Protocol[C]//Proceedings of International Conference on Computer Engineering&Systems,December 14-16,2009,Cairo,Egypt.Washington D.C.,USA:IEEE Press,2009:508-513.
5Al-Janabi S T F,Rasheed M A.Public-key Cryptography Enabled Kerberos Authentication[C]//Proceedings of De SE’11,December 6-8,2011,Dubai,United Arab Emirates.Washington D.C.,USA:IEEE Press,2011:209-214.
6Abdelmajid N T,Hossain M A,Shepherd S,et al.Locationbased Kerberos Authentication Protocol[C]//Proceedings of the 2nd International Conference on Social Computing.Washington D.C.,USA:IEEE Press,2010:1099-1104.