1. Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Jamalul-lail Ab Manan, Ramlan Mahmod: A secure TFTP protocol with security proofs. In: Lecture Notes in Engineering and Computer Science: Proceedings of the World Congress on Engineering 2014, vol. 1, pp. 443–448. WCE, London, 2–4 July 2014
2. Lear, E.: Uniform Resource Identifier (URI) Scheme and Applicability Statement for the Trivial File Transfer Protocol (TFTP). In: RFC 3617 (2003)
3. Mohd Anuar Mat Isa, Nur Nabila Mohamed, Habibah Hashim, Syed Farid Syed Adnan, R.M., Jamalul-lail Ab Manan: A lightweight and secure TFTP protocol in the embedded system. In: 2012 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE 2012) (2012). Kota Kinabalu Sabah, Malaysia.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6482117&tag=1
4. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Lecture Notes in Computer Science: Advances in Cryptology – CRYPTO’98, pp. 1–18.
http://link.springer.com/chapter/10.1007/BFb0055717
(1998).
5. Boneh, D.: The decision Diffie-Hellman problem. In: Algorithmic Number Theory.
http://link.springer.com/chapter/10.1007/BFb0054851
(1998).