Commercial Key Escros: Something for Everyone Now and for the Future, Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, Dennis K. Branstad, David M. Balenson, Trusted Information Stystems, Inc., Jan. 3, 1995, pp. 1-14. |
Information Security and Privacy in Network Environments, OTA-TCT-606, Chapter 4 (Washington, D.C., U.S. Government Printing Officce, Sep., 1994). |
Contemporary Cryptology The Science of Information Integrity, Edited by Gustavus J. Simmons, IEEE Press 1992, pp. 25-36, 48-58, 179-229, 356-373, 379-419, 501-505, 517-521, 552-557. |
RSA's Frequently Asked Questions about Today's Cryptography: General, World Wide Web address: http://www.rsa.com/rsalabs/faq/faq.sub.-- gnrl.html. |
RSA's Frequently Asked Questions about Today's Cryptography: Miscellaneous, World Wide Web address: http://www.rsa.com/rsalabs/faq/faq.sub.-- misc.html. |
RSA's Frequently Asked Questions about Today's Cryptography: RSA, World Wide Web address:http://www.rsa,com/rsalabs/faq/faq.sub.-- rsa.html. |