1) The document discusses authentication methods including Kerberos and X.509. Kerberos provides centralized authentication using encryption keys without public key encryption. X.509 uses public key encryption and digital signatures to authenticate users through certificates signed by certificate authorities.
2) Kerberos versions 4 and 5 are described, with version 5 allowing inter-realm authentication. Kerberos uses tickets and authenticators to allow clients access to services. X.509 certificates contain a user's public key and are signed by a certificate authority.
3) Recommended reading on Kerberos and authentication includes websites on the Kerberos protocol and papers describing its evolution.