1992, Feb. 4, Lampson, B., Abadi, M., Burrows, M., Wobber, Edward, Authentication in Distributed Systems: Theory and Practice, Digital Systems Research Center, Palo Alto, CA. |
1994, Bruce Schneier, Applied Cryptography, pp. 139-153, pp. 176-178, John Wiley Sons Inc. |
1994, Cheswick, W.R., Bellovin, S.M., Firewalls and Internet Security, pp. 119-124, 211-234, Copyright AT&T Bell Labs., Inc., Murray Hill, NJ. |
Bellovin, S.M., Pseudo-Network Drivers and Virtual Networks, AT&T Bell Labs. Murray Hill, NJ. |