2Bruce Schneier,authorized translation by WuShizhong,ZhuShixiong,ZhangWenzheng.Applied Cryptography—Protocols, algorithms, and source code in C[ M[]..2000
3Chen Yuliu.Tsinghua University Publishing House[].IDEF modeling analysis and design methods.1999
4Koopman Weaver.Embedded system security[].Computer.2004