1. Federal Trade Commission :Federal Trade Commission Identity Theft Survey Report , p. 7 (September 2003), http://www.ftc.gov/os/2003/09/synovatereport.pdf
2. Jesdanun, A.: Thief captures every keystroke to access accounts. Seattle Post (July 2003), http://seattlepi.nwsource.com/national/131961_snoop23.html
3. Poulsen, K.: Guilty Plea in Kinko’s Keystroke Caper. SecurityFocus ,July 18 (2003), http://www.securityfocus.com/printable/news/6447
4. Jurgensen, T.M., Guthery, S.B.: Smart Cards. Pearson Education, Inc, London (2002)
5. Kerberos: The Network Authentication Protocol , http://web.mit.edu/kerberos/www/