1. Information Technology?Security Techniques. Entity Authentication Mechanisms ? Part 3: Entity Authentication Using a Public-Key Algorithm (CD 9798-3), Nov. 199 (ISO/IEC JTCI/SC27 Committee Draft #4).
2. Lecture Notes in Computer Science 434;F. Bauspiess,1990
3. Bellovin, S.M. and Merritt, M. 1990. Limitations of the Kerberos authentication system. ACM Computer Communication Review 20 (5):119?132.
4. Bengio, S., Brassard, G., Desmedt, Y.G., Coutier, C., Quisquater, J.-J. 1991. Secure implementation of identification system. J. Cryptology 4 (3):175?183.
5. Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., and Yung, M. Forthcoming. Systematic design of two-party authentication protocols. Advances in Cryptology?Crypto '91, Berlin/New York: Springer-Verlag.