1. Lecture Notes in Computer Science;M. Abdalla,2005
2. Lecture Notes in Computer Science;J.H. An,2002
3. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th Symposium on Theory of Computing – STOC 1998, pp. 419–428. ACM, New York (1998)
4. Lecture Notes in Computer Science;M. Bellare,2000
5. Lecture Notes in Computer Science;M. Bellare,2000