1. Cryptographic solution to a multilevel security problem;Akl,1982
2. Cryptographic solution to a problem of access control in a hierarchy;Akl;ACM Transaction on Computer Systems,1983
3. Bakhtiari S, Safavi-Naini R, Pieprzyk J. Cryptographic hash functions: a survey. Technical Report 95-09, Department of Computer Science, University of Wollongong; July 1995.
4. Hardjono T, Cain B, Monga I. Intra-domain group key management protocol. Internet-Draft, draft-ietf-ipsec-intragjm-00.txt; November 1998.