1. Griffin, Phillip. H. (2014). Telebiometric Authentication Objects. Complex Adaptive Systems 2014 Proceedings. Procedia Computer Science, 36, 393-400. Retrieved June 12, 2015, from http://www.sciencedirect.com/science/article/pii/S1877050914012605.
2. Fong, S., Zhuang, Y., & Fister, I. (2013). A biometric authentication model using hand gesture images. Biomedical engineering online, 12(1), 111. Retrieved June 12, 2015, from http://www.biomedical-engineering-online.com/content/12/1/111/.
3. Abdalla, M., Bresson, E., Chevassut, O., Möller, B. and Pointcheval, D. (2007). ‘Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol’, Int. J. Security and Networks, Vol. 2, Nos. 3/4, pp.284-296. Retrieved June 12, 2015, from http://www.ssi.gouv.fr/uploads/IMG/pdf/AbdBreCheMol_07.pdf.
4. Larmouth, John L. (2000). ASN.1 Complete. Morgan Kaufmann. Retrieved June 12, 2015, from http://www.oss.com/asn1/resources/books-whitepapers-pubs/larmouth-asn1-book.pdf.
5. lsaid, A., & Mitchell, C.J. (2006). Preventing phishing attacks using trusted computing technology. In Proceedings of the 6th International Network Conference (INC’06) (pp. 221-228). Retrieved June 12, 2015, from https://www.cs.auckland.ac.nz/research/groups/ssg/pastbib/pastpapers/alsaid06preventing.pdf.