1. A. D. Wyner, “The Wire-tap Channel,” The Bell System Technical Journal, Vol. 54, No. 8 (Oct. 1975), pp. 1355–1387.
2. G. J. Simmons. “A Preliminary Report on a Theory of Authentication,” Proceedings of the IEEE National Electronics Conf., Chicago, IL (Oct. 28–29, 1981), pp. 315–318.
3. G. J. Simmons, “Verification of Treaty Compliance — Revisited,” Proceedings of the IEEE 1983 Symposium on Security and Privacy, Oakland, CA (Apr. 25–27, 1983), pp. 61–66.
4. G. J. Simmons. “A System for Verifying User Identity and Authorization at the Point-of-Sale or Access,” Cryptologia, Vol. 8, No. 1, January 1984, pp. 1–21.
5. G. J. Simmons, “Message Authentication: A Game on Hypergraphs,” Proceedings of the 15th Southeastern Conference on Combinatorics, Graph Theory and Computing. Baton Rouge, LA, March 5–8, 1984, (to appear).