1. A.V. Aho, J.E. Hopcroft, and J.D. Ullman, The Design and Analysis of Computer Algorithms, Addison Wesley, 1974.
2. Ben-David, S., Chor, B., Goldreich, O., Luby, M., On the Theory of Average Case Complexity, Proc. STOC 1989, pp. 204–216.
3. M. J. Beller, L. F. Chang, Y. Yacobi, Privacy and Authentication on a Portable Communications System, IEEE Globecom’ 91 Conference Proceedings, Phoenix, December 1991.
4. D. C. Cox, Portable Digital Radio Communications-An Approach to Tether-less Access, IEEE Communications Magazine, Vol. 27, No. 7, July 1989.
5. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Trans. on Inform. Theory, vol. IT-22, pp. 664–654, Nov. 1976.