E.Basturk et al, Efficient Methods for Two Party Entity Authentication and Key Exchange in a High Speed Environment,IBM Technical Disclosure Bulletin,295-296, Mar. 1995.* |
Ray Bird et al., The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution, IEEE,31-39, Feb. 1995.* |
“Advances in Cryptology—CRYPTO '94” Y. G. Desmedt, 14th Annual International Cryptology Conference, Aug. 1994, Springer-Verlag, p 216-233. |
“Computer Security—ESORICS 92” Deswarte et al., Springer-Verlag, 1992 2nd European Symposium On Research in Computer Security, pp. 155-174. |
“Efficient Methods for . . . High Speed Environment”, E. Basturk et al., IBM Technical Disclosure, vol. 38, No. 3, Mar. 1995, pp. 295-297. |
“Firewalls aren't Enough:Authentication and Key Distribution Systems” R. Oppliger, Computer Security Journal, vol. XI, No. 2, 1995, p. 15-24. |
“Secure and . . . key distribution”, Janson et al., Elsevier Science B.V. vol. 18, No. 9, Sep. 1995, pp. 645-653. |
“The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, R. Bird et al., IEEE/ACM Transactions on Networking, vol. 3, No. 1, Feb. 1995, pp. 31-41. |