Applied Cryptography, 2nd Ed (1996)

by B Schneier
Venue:Jones Informational [Page 74] 3871 Operational Security Requirements