| Claassen et al., "Secure communication procedure for ISDN", IEEE Trans. on computers, pp. 165-170, Jun. 1988. |
| Eric Benhanmou, "Integrating Bridges and Routers in a large internetwork", IEEE Network, pp. 65-71, Jan. 1988. |
| Weaver et al., "A real-time Monitor for token ring Networks", IEEE Trans. on computers, pp. 0794-0798, May 1989. |
| Ramesh Karri, "A Security Imbedded authentication protocol", IEEE Trans. on computers, pp. 1105-1109, Jun. 1988. |
| Cole et al., "An architecture for a mobile OSI mail access system", IEEE Journal on selected Areas in communications, vol. 7, No. 2, pp. 249-256, Feb. 1989. |
| Nakao et al., "Proposal on a secure communications service element in the OSI application Layer", IEEE Journal on selected areas on communications, vol. 7, No. 4, pp. 505-516, May 1989. |
| Ciminiera et al., "Authentication mechanism in microprocessor-based local area networks", IEEE Trans. on software Engineering, col. 15, No. 5, pp. 654-658, May 1989. |
| Lu et al., "Secure communication in internet environments: A hierarchical key management Scheme for end-to-end encryption", IEEE Trans. on communications, vol. 37, No. 10, pp. 1014-1023, Oct. 1989. |