1. M. Abadi and R. Needham. “Prudent engineering practice for cryptographic protocols”. 1994.
2. R.B.Ash. “Information Theory”. Dover Publications,Inc. New York 1965.
3. D.Denning “Cryptography and Data Security”. Addison-Wesley Publ., 1983
4. M.Barra, G.Cattaneo, A.Negro, V.Scarano. “Symmetric Adaptive Customer Modeling in an Electronic Store”. Submitted for publication, 1997.
5. T. Berners-Lee. “World Wide Web Initiative”. WWW Home Page. [URL: http://info. cern.ch/hypertext/WWW/TheProject.html]