Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacksG. TsudikEls Van Herreweghen1993SRDS 1993
Processor group membership protocols: Specification, design and implementationFarnam JahanianS. Fakhouriet al.1993SRDS 1993