1. Handbook of Applied Cryptography;Menezes,1997
2. http://web2.utc.edu/~Li-Yang/cpsc4600/08_Entity-Authentication14.ppt
3. An Implementation of Physical Layer Authentication Using Software Radio;Yu,2009
4. Authentication theory/coding theory;Simmons,1985
5. Authentication theory and hypothesis testing;Maurer;IEEE Trans. Inf. Theory.,2000