3V. L. Voydock,S. L. Kent. Security mechanisms in high-level network protocols[J]. Computer Surveys ,1983,15(2) : 135 - 171.
4R. Fisher. Information Systems Security[M]. Englewood Cliffs, NJ : Prentice - Hail, 1984.
5G. J. Simmons. Authentication without Secrecy:A secure Communication Problem Uniquely Solvable by Asymmetric Encryption Techniques[A]. Proceedings of IEEE EASCON79[C] ,1979:661 -662.
7Simmons, G. J, ,Sandia Nat. Lab. , Albuquerque, NM. A survey of information authentication [J]. Proceedings of the IEEE, 1998,76 (5) : 603 - 620.
8G. J. Simmons. Cryptanalysis and protocol failures[J]. Communication of the ACM, 1994,37( 11 ) :56 -65.
9Richard Baskerville. Information systems security design methods[J].Implications for Information Systems Development. ACM Computing Surveys, 1993,25 (4) :275 - 414.
10V. A. Ashby,Thomas Gregg, Annabelle Lee. Security Approach for Rapid Prototyping in Multilevel Secure Systems[M]. IEEE Press, 1990.