IBM Technical Disclosure Bulletin vol. 28 No. 3 Aug. 1985 pp. 1065-1069. |
R. Bird et al.; "Systematic Design of a Family of Attack-Resistant Authentication Protocols"; IEEE Journal on Selected Areas in Communications, vol. 11, No. 5, pp. 679-693. |
M. Bellare et al.; "Models of Entity Authentication"; Advances in Cryptology: Proc. of Crypto 93, Aug. 1993. |
R. Ostrovshy et al.; "How to Withstand Mobile Virus Attacks"; Proc. of the 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, 1991, pp. 51-59. |