1. Security on the Internet: authenticating the user;Botting;Telecommunications,1997
2. Improvement on Peyravian-Zunic's password authentication schemes;Hwang;EICE Transactions on Communications,2002
3. Public key cryptography and password protocols;Halevi,1998
4. Methods for protecting password transmission;Peyravian;Computers and Security,2000
5. Applied Cryptography;Schneier,1996