1. 2
Computer Emergency Response Team (CERT) Coordination Center 1994 Annual Report (Summary). http://www.cmu.edu/SEI/programs/cert/1994_CERT_Summary.html. 2 Computer Emergency Response Team (CERT) Coordination Center 1994 Annual Report (Summary) . http://www.cmu.edu/SEI/programs/cert/1994_CERT_Summary.html .
2. 3
Steven M. Bellovin and Michael Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise AT&T Bell Laboratories. Available via anonymous FTP from idea.sec.dsi.unimi.it. 3 Steven M. Bellovin and Michael Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise AT&T Bell Laboratories. Available via anonymous FTP from idea.sec.dsi.unimi.it.
3. 5
William A.Wulf Alec Yasinac Katie S. Oliver and Ramesh Peri. A Technique for Remote Authentication University of Virginia Charlottesville VA. Available via anonymous FTP from ftp.research.att.com. 5 William A.Wulf Alec Yasinac Katie S. Oliver and Ramesh Peri. A Technique for Remote Authentication University of Virginia Charlottesville VA. Available via anonymous FTP from ftp.research.att.com .