1. Authentication, access control, and intrusion detection;Sandhu,1997
2. The evaluation of the Kerberos authentication service;Kohl,1994
3. ?Data encryption standard?, National Bureau of Standards, US Department of Commerce, Federal Information Processing Standards Publication 46, Washington, DC, 1977
4. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Communications of the ACM,1978
5. A note on proactive password checking;Yan,2001