1. Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication Rep. 39. Digital Equipment Corporation Systems Research Center. Palo Alto, Calif. (1989)
2. Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
3. Bennet, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. Proc. IEEE Conf. on Computers, Systems and Signal Processing, 175–179, Bangalore (1984)
4. Bennet, C.H., Brassard, G.: An Update on Quantum Cryptography. CRYPTO ’84 LNCS, Bd. 196, S. 475–480, Springer (1985)
5. Bennet, C.H., Brassard, G., Ekert, K.: Quanten-Kryptographie. Zeitschrift Spektrum der Wissenschaft, Heft 12, 96–104 (1992)