1. Ashley P. & Vandenwauver M. (1999). Practical Intranet Security: An Overview of the State of the Art and Available Technologies, Kluwer Academic Publishers.
2. Au R., Looi M. & Ashley P. (2000) Cross-Domain One-Shot Authorisation Using Smart Cards. Proceedings of 7th ACM Conference on Computer and Communication Security, pages 220–227.
3. Au R., Looi M. & Ashley P. (2001) Automated Cross-organisational Trust Es tablishment on Extranets. Proceedings of the Workshop on Information Technology for Virtual Enterprises, pages 3–11.
4. Dallas Semiconductor Corp. (1995) DS1954 Technical Information-Cryptographic iButton. Available at URL:
http://www.iButton.com
5. Molva R. & Samfat D. & Tsudik G. (1994) Authentication of Mobile Users. IEEE Network, vol 26, iss 2, pages 26–34.