Here are a few suggestions for resources with more information about network security.
- Bellovin, S. M., and M. Merritt. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks.” In Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy (1992): 72-84
- Bellovin, S. M., and M. Merritt. “Limitations of the Kerberos Protocol.” Winter 1991 USENIX Conference Proceedings (1991): 253-267
- Davies, D. W., and W. L. Price. “The Application of Digital Signatures Based on Public-Key Cryptosystems.” Proceedings of the Fifth International Computer Communications Conference (Oct 1980): 525-530.
- Davies, D. W., and W. L. Price. Security for Computer Networks, 2d ed. New York: John Wiley & Sons, 1989.
- Davies, D. W., and W. L. Price. “Digital Signatures — An Update.” From Proceedings of International Computer Communications, Oct. 1984. Sydney, Australia. North Holland: Elsevier Science Publishers, (1985): 843-847.
- Denning, D. E., and C. M. Sacco. “Timestamps in Key Distribution Protocols.” Communications of the ACM, v.24, n. 8. (Aug 1981): 533-536.
- Jin, T. Care and Feeding of Your Three-Headed Dog. Document Number IAG-90-11. Hewlett-Packard Corporation (May 1990).
- Jin, T. Living with Your Three-Headed Dog. Document Number LAG-90-012. Hewlett-Packard Corporation (May 1990).
- Kohl, J. T. “The Evolution of the Kerberos Authentication Service.” From the EuroOpen Conference Proceedings. (May 1991): 295-313
- Needham, R. M., and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers.” In Communications of the ACM, v.21, no. 1. (Dec 1978): 993-999
- B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc. 1994.
- Sjogren, S. “A Bite Out of LAN Crime ” In INTEROPERABILITY. (Spring 1991). Supplement to LAN Magazine.
- Steiner, J. G., and B. C. Neauman, J. I. Schiller, and J. H. Saltzer, “Kerberos, An Authentication Service for Open Network Systems.” From USENIX Conference Proceedings. (Feb 1989): 91-202
- Russell, D., and G.T. Gangemi Sr., Computer Security Basics, O'Reilly & Associates, Inc., 1992.