| J. Tygar & B. Yee, Dyad: A System for Using Physically Secure Coprocessors, Technical Report CMU-CS-91-140R, Carnegie Mellon University, May 1991. |
| B. Yee, Using Secure Coprocessors, Ph.D. Thesis, Carnegie Mellon University, May, 1994. |
| P. C. Clark, BITS: A Smartcard Protected Operating System, Ph.D. Thesis, George Washington University, May 8, 1994. |
| B. Lampson et al., Authentication in Distibuted Systems: Theory and Practice, ACM Transactions on Computer Systems, v10:265-310, Nov. 1992. |
| R. Droms, Authentication for DHCP Messages, expired RFC draft, Nov. 1998. |
| D. Eastlake & C. Kaufman, Domain Name System Security Extensions, Internet RFC 2065, Jan. 1997. |
| W. Diffie et al., Authentication and Authenticated Key Exchanges, Codes and Cryptography, 2:107-125, 1992. |
| Digital Signature Standards, Technical Report FIPS-186, U.S. Department of Commerce, May 1994. |
| Secure Hash Standard, Technical Report FIPS-180-1, U.S. Department of Commerce, Apr. 1995. |
| HMAC: Keyed-Hashing for Message Authentication, Internet RFC 2104, Feb. 1997. |
| Dynamic Host Configuration Protocol, Internet RFC 2131, Mar. 1997. |
| DHCP Options and BOOTP Vendor Extensions, Internet RFC 2132, Mar. 1997. |
| J Reynolds & J Postel, Assigned Numbers, Internet RFC 1700, Oct. 1994. |
| K. R. Sollins, The TFTP Protocol (revision 2), Internet RFC 1350. Jul. 1992. |
| G. Malkin & A. Harkin, TFTP Option Extension, Internet RFC 1782, Mar. 1995. |