1. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
2. CCITT X509 and ISO 9594–8: The Directory – Authentication Framework CCITT Blue Book, Geneva (March 1988)
3. Anderson, R.: Security Engineering. Wiley Computer Publishing, Chichester (2001)
4. Lecture Notes in Computer Science;M. Burrows,1989
5. Lecture Notes in Computer Science;C. Meadows,1994