1Bruce Schneier. Applied Cryptography:Protocols,Algorithms,and Source Code in C,Second Edition[M].New York:wiley,1996.
2Hongjun Liu,Ping Luo,Daoshun Wang. A distributed expansible authentication model based on Kerberos[J].Journal of Network and Computer Applications,2008,(04):472-486.doi:10.1016/j.jnca.2007.12.003.
3Rafael Mar í n-L ó pez,Fernando Pere í guez,Gabriel L ó pez,Alejandro P é rez-M é ndez. Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations[J].Computer Standards and Interfaces,2011,(05):494-504.
4Ming-Chin Chuang,Jeng-Farn Lee. A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks[J].Computer Networks,.
5Hongjun Liu,Ping Luo,Daoshun Wang. A scalable authentication model based on public keys[J].Journal of Network and Computer Applications,2008,(04):375-386.doi:10.1016/j.jnca.2008.03.001.
6Y.L.Huang,P.H.Lu,J.D.Tygar,A.D.Joseph. OSNP:Secure wireless authentication protocol using one-time key[J].Computers and Security,2009,(08):803-815.