[1]
R. Aghila, K. Nagalakshmi, B. S. Roopan, S. Rajakrishnan, and T. Anandaraj, “A Formal Analysis and Some Properties of Kerberos in Network Security”, AJCST, vol. 1, no. 1, pp. 6–10, May 2012.