1. “A survey of covert channels and countermeasures in computer network protocols.”;Zander;IEEE Communications surveys and tutorials,2007
2. “A Note on the Confinement Problem.”;Lampson;Communications of the ACM,1973
3. “Limitations of end-to-end encryption in secure computer networks.”;Padlipsky,1978
4. “Covert channels in LAN’s.”;Girling;IEEE Transactions on software engineering,1987
5. “Traffic flow confidentiality in IPsec: protocol and implementation.”;Kiraly;The International federation for information processing,2008