Design and implementation of modular key management protocol and IP secure tunnel on AIXPau-Chen ChengJuan A. Garayet al.1995USENIX Security 1995
Network randomization protocol: A proactive pseudo-random generatorChee-Seng ChowAmir Herzberg1995USENIX Security 1995