"BBC-Datacast-Conditional Access Operation," Bradshaw et al., Conference on Electronic Delivery of Data and Software (Publ. No. 69), London, UK, Sep. 16-17, 1986, pp. 99-105. |
"Comparing the Security of Pay-TV Systems in an Australian Context," by L. Brown, Australian Telecommunication Research 1990, Australia, vol. 24, No. 2, pp 1-8. |
"Entity Authentication and Key Distribution," Bellare et al., Advances in Cryptology (Crypto), Santa Barbara, Aug. 22-26, 1993, No. Conf. 13, Aug. 22, 1993, pp 232-249. |
"Authentication and Authenticated Key Exchanges," by W. Diffie et al., Designs, Codes and Cryptography, vol. 2, No. 2, Jun. 1, 1992, pp. 107-125. |
"Fully-Fledged Two-Way Public Key Authentication and Key Agreement for Low-Cost Terminals," Beller et al., Electronic Letters, vol. 29, No. 11, May 27, 1993, pp. 999-1001. |