1. Security for infinite networks;Nelson,1995
2. Practical authentication for distributed computing;Linn,1990
3. Authentication in the TAOS operating system;Wobber;ACM Transactions on Computer Systems,1994
4. Trusted computer system evaluation criteria;Department of Defense,1985