1. Numerical Analysis;Richard Burden,1989
2. Cryptography and Data Security;Denning,1982
3. James W. Gray III. Toward a mathematical foundation for information flow security. In Proc. 1991 IEEE Symposium on Security and Privacy, pages 21–34, Oakland, CA, May 1991.
4. James L. Massey. Guessing and entropy. In Proc. IEEE International Symposium on Information Theory, Trondheim, Norway, 1994.
5. Jonathan Millen. Covert channel capacity. In Proc. 1987 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1987.