1. Information Security––Protecting the Global Enterprise;Pipkin,2000
2. Technical report, Universal Mobile Telecommunications Systems (UMTS); 3G Security; Security Threats and Requirements, ETSI at http://www.etsi.org/, 2001
3. Handbook of Mobile Radio Networks;Tabbane,2000
4. Cryptography and Network Security: Principles and Practice;Stallings,1999
5. Cryptography and E-commerce;Graff,2001