1. Michael Burrows, Martín Abadi, and Roger Needham. Authentication: A practical study in belief and action. Technical Report 138, University of Cambridge Computer Laboratory, 1988.
2. Technical Report;M. Burrows,1989
3. CCITT. CCITT blue book, Recommendation X.509 and ISO 9594-8, Information Processing Systems — Open Systems Interconnection — The Directory — Authentication Framework. Geneva, March 1988.
4. Don Coppersmith. Analysis of ISO/CCITT document X.509 annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June 1989.
5. D.E. Denning and G.M. Sacco. Timestamps in key distribution protocols. CACM, 24(28):533–536, 1981.