1. B.Bryant.Designing an Authentication System: A Dialogue in Four Scenes. Project Athena Massachusetts Institute of Technology Cambridge MA 1988.
2. Reasoning about Belief in Cryptographic Protocols;Gong L.;Proceedings of the IEEE Symposium on Security and Privacy,1990
3. R.Needham M.Schroeder. “Using Encryption for Authentication in Large Networks of Computers.”Communications of the ACM Vol. 21 No. 12 1978.
4. R.Needham M.Schroeder.“Authentication Revisited.”Operating Systems Review Vol.21 No.1 1987.