Applied Cryptography; Author, Bruce Schneier; 1994 Basic Protocols, Chapter 3, pp. 42-65 and Reference pp. 591 and 593. |
Parkinson, Kirsten L. and Swartz, Ian, Skepticism greet Apple CD plan, MacWeek, Aug. 16, 1993, vol. 7, pp. 1, 92. |
Fahn, Paul, Answers to Frequently Asked Questions About Today's Cryptography, from RSA Laboratories, Version 1.0, pp. 1-52. |
Bryant, Bill, Designing an Authentication System: a Dialogue in Four Scenes, Project Athena, Massachusetts Institute of Technology, pp. 1-13, Feb. 8, 1988. |
Batelaan, Richard, et al., Internet Billing Service Design and Prototype Implementation, Carnegie Mellon University Information Networking Institute 1992 Final Project, Mar. 30, 1993, pp. 1-16. |
Steiner, Jennifer G., et al., Kerberos: An Authentication Service for Open Network Systems, Project Athena, Massachusetts Institute of Technology, Mar. 30, 1988, pp. 1-14. |