Schneier, Applied Cryptography, 2nd edition, pp. 185-187, Oct. 1995. |
Authentication and Delegation with Smart-Cards, M. Abadi, Mr. Burrows, C. Kaufman, B. Lampson, Oct. 22, 1990. |
Robustness Principles for Public Key Protocols, Ross Andersin and Roger Needham. |
Decentralized Trust Management, Matt Blaze, Joan Feigenbaum and Jack Lacy, 1996 IEEE. |
Achieving Electronic Privacy by David Chaum, Scientific American, Aug. 1992. |
Compliance Defects in Public-Key Cryptography, Don Davis May 29, 1996. |
Network Security via Private-Key Certificates, Don Davis and Ralph Swick, pp. 64-67. |
On the Factorization of RSA-120. |
Establishing Identity Without Certification Authorities, Carl M. Ellison, pp. 67-76. |
Cryptographic Sealing for Information Secrecy and Authentication, David K. Gifford, Aprik 1982,/vol. 24, No. 4. |
Payment Switches for Open Networks, David K. Gifford, Lawrence C. Stewart, Andrew C. Payne and G. Winfield Treese, First USENIX Workshop on Electronic Commerce—Jul. 11-12, 1995. |
Authentication in Distributed Systems: Theory and Practice, Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. |
Requirements for Network Payment: The NetCheque™ Perspective, B. Clifford Neuman, Gennady Medvinsky, pp. 32-37. |
Northern Telecom (Nortel) Introduces Web-Based Security Software Product Entrust/WebCA Enables Web Session Security, Nov. 11, 1996, pp. 1-2. |
The Future of Integer Factorization, Andrew M. Odlyzko, The Technical Newsletter of RSA Laboratories—Summer 1995, pp. 5-12. |
OM-Transact: A Technical Overview, Oct. 1996, pp. 1-24. |
Become a CA: Avoid the middleman by Eamonn Sullivan, pp. 1-2, Nov. 11, 1996. |
CPS Section 5: Validation of Certificate Applications, Apr. 22, 1997. |
SET Background, May 5, 1998. |