1. Barker, E., Johnson, D., Smid, M.: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised), NIST Special Publication 800-56A (March 2007),
http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf
2. Bellovin, S., Merritt, M.: Encrypted Key Exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (May 1992)
3. Lecture Notes in Computer Science;F. Hao,2010
4. Lecture Notes in Computer Science;F. Hao,2011
5. Entrust TruePass Product Portfolio: Strong Authentication, Digital Signatures and end-to-end encryption for the Web Portal, Technical Overview, Entrust Inc. (July 2003),
http://www.entrust.com/wp-content/uploads/2013/05/entrust_truepass_tech_overview.pdf