4LAMPORT L. Password Authentication with Insecure Communication [J].Communications of the ACM, 1981,24 ( 11 ) :770-772.
5HALLER N M. The S/Key One-time Password System[J].Proceedings of The Internet Society Symposium on Network and Distributed System Security, Sam Diego, CA.1994: 96-97.
3J Howard. An Analysis of Security Incidents on The Internet:1989 - 1995. PhD Thesis, Carnegie- Mellon University, 1997.4.
4G A Office. Information Security: Computer Attacks at Department of Defense Pose Increasing Risks. Tech. Rep. GAO/AIMD96-84, U S Government Accounting Office, 1996.
5D A McGrew and S R Fluhrer. The Stream Cipher Encapsulating Security Payload. Draft-mcgrew-ipsec-scesp-01. txt, IETF,2000.7.
7A J Menezes, P C van Orsehot, and S A Vanstone. Handbook of Applied Cryptography. CRC1996.
8S Kent and R Atkinson. RFC 2401, Security Architecture for the Internet Protocol. IETF, 1998.11.
9Chaum D, Van Antwerpen H. Undeniable Signatures[C]. Proc. of the Advances in Cryptography-CRYPTO'89, LNCS 435, Berlin:Springer-Verlag, 1989. 212-216.
10National Institute of Standard and Technology. NIST FIPS PUB 1801, Secure Hash Standard[EB/OL]. http://csrc.nist.gov/cryptval/html, Washington: Department of Commerce, NIST, 1995.