1. Fiat, A. and Shamir, A., “How to Prove Yourself: Practical Solutions to Identical Solutions to Identification and Signature Problems”, Crypto'86, 1986.
2. Jennifer G. Steiner B. Clifford Neuman, and Jeffrey I. Schiller, “Kerbero: An Authentication Service for Open Network Systems”, Usenix Conference Proceedings, pages 183–190, February 1988.
3. Matsumoto, T. and Imai, H., “Human Identification Through Insecure Channel”, Eurocrypt'91, 1991.
4. Ohta, K. and Okamoto, T., “A Modification of the Fiat-Shamir Scheme”, Crypto'88, 1988.
5. Davies, D.M. and Price, W.L., Security for Computer Networks, Chapter 7, John Wiley & Sons, 1984.