1. Bellovin, S., & Merritt, M. (1993). Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st annual conference on computer and communications security. New York: ACM.
2. Kai, H., & Ou, Q. Y. (2009). Cryptanalysis of a remote user authentication scheme using smart cards, wireless communications, networking and mobile computing. In Proceedings of the WiCom ’09. 5th international conference on date of conference (pp. 1–4).
3. Mary, R. T., Abdelilah, E., & Srilekha, M. (2003). Certificate-based authorization policy in a PKI environment. ACM Transactions on Information and System Security, 6(4), 566–588.
4. Simson, G. (2003). Pretty good privacy (PGP). Encyclopedia of Computer Science, 4, 1421–1422.
5. Neuman, C., & Kerberos, T. T. (1994). Kerberos: An authentication service for computer networks. IEEE Communication Magazine, 32(9), 33–38.