B. Schneier, “Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C,” John Wiley & Sons, Inc., Oct. 18, 1995, pp. 185-187, 574-577.* |
A.J. Menezes et al., “Handbook of Applied Cryptography,” CRC Press, Oct. 16, 1996, pp. 576-577.* |
Article Entitled “IP Mobility Support” by C. Perkins, Oct. 1996, pp. 1-68. |
Article Entitled “Rapid Authentication for Mobile IP” by Luis A. Sanchez et al, Nov. 21, 1997, pp. 1-21. |
Article Entitled “Security Architecture for the Internet Protocol” by S. Kent, Jul. 1998, pp. 1-54. |
Perkins, Charles E. and Luo, Kevin, Using DHCP with computers that move, J.C. Baltzer AG. Science Publishers, Oct. 1, 1995, vol. 1, No. 3, Amsterdam, NL, pp. 341-353. |