1. Abley, J., P. Savola, and G. Neville-Neil. 2007. Deprecation of type 0 routing headers in IPv6. http://tools.ietf.org/html/rfc5095 . Accessed 24 Feb 2011.
2. Aura, T., and M. Roe. 2006. Designing the mobile IPv6 security protocol. Annales des Télécommunications 61(3–4): 332–356.
3. Biondi, P., and A. Ebalard. 2007. IPv6 routing header security. http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf . Accessed 24 Feb 2011.
4. Branagan, M., R. Dawson, and D. Longley. 2006. Security risk analysis for complex systems. In Proceedings of the Information Security for South Africa 2006 from Insight to Foresight Conference, Pretoria, South Africa, 2006.
5. 4. Caelli, W.J., D. Longley, and A.B. Tickle. 1992. A methodology for describing information and physical security architectures. In Eighth International Conference on Information Security