[1]
B. Y. Alkhayaat, A. M. khidhir, and O. A. Ibraheem, “Protection Against Internal Intruding using Host Identifier Authentication”, RJCSM, vol. 6, no. 1, pp. 223–236, Jan. 2009.