@Article(Needham&Schroeder, Author="Needham, R. M. and Schroeder M. D.", Key="Needham&Schroeder", Title="Using Encryption for Authentication in Large Networks of Computers", Journal="CACM", Volume="21", Number="12", Pages="993-999", Month="Dec", Year="78") @Manual(Kerberos, Author="S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer", Key="Kerberos", Title="Kerberos Authentication and Authorization System", Organization="Massachusetts Institute of Technology", Year="1987", Note="Project Athena Technical Plan, Section E.2.1, dated 21 Dec 1987") @Book(Meyer&Matyas, Author="Meyer, C. H. and Matyas, S. M.", Key="Meyer&Matyas", Title="Cryptography: A New Dimension in Computer Data Security", Publisher="John Wiley & Sons", Year="1982")