Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacksG. TsudikEls Van Herreweghen1993SRDS 1993Conference paper
Processor group membership protocols: Specification, design and implementationFarnam JahanianS. Fakhouriet al.1993SRDS 1993Conference paper