Lampson, Butler; Abadi, Martin; Burrows, Michael; and Wobber, Edward; "Authentication in Distributed Systems: Theory and Practice"; ACM Transactions on Computer Systems; vol. 10, No. 4; Nov., 1992; pp. 265-310. |
Needham, Roger M. and Schroeder, Michael D.; "Using Encryption for Authentication in Large Networks of Computers"; Communications of the ACM; vol. 21, No. 12; Dec., 1978; pp. 993-999. |
Rivest, R.L. et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts. |
Rivest, R.; "The MD5 Message-Digest Algorithm"; MIT Laboratory for Computer Science and RSA Data Security, Inc.; Apr., 1992. |
Voydock, Victor et al.; "Security Mechanisms in High-Level Network Protocols"; Computing Surveys; vol. 15, No. 2; Jun. 1981. |
Needham, Roger M.; "Adding Capability Access to Conventional File Servers"; Xerox Palo Alto Research Center; Palo Alto, California. |
Gligor, Virgil D. et al.; "Object Migration and Authentication"; IEEE Transactions on Software Engineering; vol. SE-5, No. 6; Nov., 1979. |
Chaum, D.L. et al.; "Implementing Capability-Based Protection Using Encryption"; Electronics Research Laboratory, College of Engineering, University of California, Berkeley, California; Jul. 17, 1978. |
Gifford, David K.; "Cryptographic Sealing for Information Secrecy and Authentication"; Stanford University and Xerox Palo Alto Research Center; Communication of the ACM; vol. 25, No. 4; Apr., 1982. |
Gifford, David K.; "Digital Active Advertising"; U.S. Patent Application Serial No. 08/168,519; filed Dec. 16, 1993. |
Tenenbaum, Jay M. and Schiffman, Allan M.; "Development of Network Infrastructure and Services for Rapid Acquisition"; adapted from a white paper submitted to DARPA by MCC in collaboration with EIT and ISI. |
Harty et al., "Case Study: The VISA Transaction Processing System," 1988. |
Abadi, M., et al, "Authentication and Delegation with Smart-cards", Oct. 22, 1990, revised Jul. 30, 1992 Report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, California. |
Information Network Institute, Carnegie Mellon University, Internet Billing Server, Prototype Scope Document, Oct. 14, 1993. |
Krajewski, M., "Concept for a Smart Card Kerberos", 15th National Computer Security Conference, Oct. 1992. |
Krajewski, M., "Smart Card Augmentation of Kerberos, Privacy and Security Research Group Workshop on Network and Distributed System Security", Feb. 1993. |
Krajewski, M. et al, "Applicability of Smart Cards to Network User Authentication", Computing Systems, vol. 7, No. 1, 1994. |
Bellcore Internal E-Mail, Nov. 24, 1993. |
Marvin A. Sirbu; Internet Billing Service Design And Prototype Implementation; pp. 1-19; An Internet Billing Server. |
United States; publication; pp. 215-135. |
National Westminster Bank Group Brochure; pp. 1-29; undated. |
Even et al; "Electronic Wallet";, pp. 383-386;1983. |
Okamoto et al; "Universal Electronic Cash", pp. 324-337; 1991. |
Pfitzmann et al; "How to Break and Repair a Provably Secure Untraceable Payment System"; pp. 338-350; 1991. |
Intuit Corp. Quicken User's Guide, "Paying Bills Electronically", pp. 171-192; undated. |
CompuServe Information Service Users Guide, CompuServe International, 1986, pp. 109-114. |
Gifford, D., "Notes on Community Information Systems", MIT LCS TM-419, Dec. 1989. |
Vittal, J., "Active Message Processing: Message as Messengers", pp. 175-195; 1981. |
Bos et al., "SmartCash: a Practical Electronic Payment System", pp. 1-8; Aug. 1990. |
American National Standard, "Financial Institution Retail Message Authentication", ANSI X9.19 1986. |
American National Standard, "Interchange Message Specification for Debit and Credit Card Message Exchange Among Financial Institutions", ANSI X9.2-1988. |
Chaum et al; "Achieving Electronic Privacy", Scientific American, pp. 319-327; 1988. |
Burk et al, "Value Exchange Systems Enabling Security and Unobservability", Computers & Security, 9 1990, pp. 715-721. |
Chaum et al, "Untraceable Electronic Cash", Advances in Cryptology, 1988, pp. 319-327. |
Schamuller-Bichl, I., "IC-Cards in High-Security Applications", in Selected Papers from the Smart Card 2000 Conference, Springer Verlag, 1991, pp. 177-199. |
Newman, B.C., "Proxy-Based Authorization and Accounting for Distributed Systems", Proc. 13th Int. Conf. on Dist. Comp. Sys., May 1993. |
Medvinsy et al., "Electronic Currency for the Internet", Electronic Markets, pp. 30-31, Sep. 1993. |
Ross J. Anderson, "UEPS --A Second Generation Electronic Wallet", Proc. of the Second European Symposium on Research in Computer Security (ESORICS), Touluse, France, pp. 411-418, Touluse, France. |
Ross Anderson, "Why Cryptosystems Fail", Proc. 1st Conf. Computer and Comm. Security, pp. 215-227, Nov. 1993. |
Semyon Dukach, "SNPP: A Simple Network Payment Protocol", MIT Laboratory for Computer Science, Cambridge, MA, 1993. |
Medvinsy et al, "NetCash: A Design for Practical Electronic Currency on the Internet", Proc. 1st ACM Conf. on Comp. and Comm. Security, Nov. 1993. |
Society for Worldwide Interbank Financial Telecommunications S.C., "A.S.W.I.F.T. Overview", undated. |
Case Study: The CIRRUS Banking Network, Comm. ACM 8, 28 pp. 7970-8078, Aug. 1985. |
Intel Corporation, iPower Technology, Marketing Brochure, date unknown. |
M. Bender, "EFTS: Electronic Funds Transfer Systems", Kennikat Press, Port Washington, New York, pp. 43-46 1975. |
Computer Shopper, Nov. 1994, "Internet for Profit", pp. 180-182, 187, 190-192, 522-528, 532, 534. |
Dukach, Seymon; Prototype Implementation of the SNPP Protocol; allspic.lcs.mit.edu; 1992. |
Cohen, Danny; "Computerized Commerce"; ISI Reprint Series ISI/RS-89/243; Oct., 1989; Reprinted from Information Processing 89, Proceedings of the IFIP World Computer Congress, held Aug. 28 -Sep. 1, 1989. |
Cohen, Danny; "Electronic Commerce"; University of Southern California, Information Sciences Institute, Research Report ISI/RR-89-244; Oct., 1989 |