| Schneier, Applied Cryptography, 2nd edition, pp. 185-187, Oct. 1995. |
| Authentication and Delegation with Smart-Cards, M. Abadi, Mr. Burrows, C. Kaufman, B. Lampson, Oct. 22, 1990. |
| Robustness Principles for Public Key Protocols, Ross Andersin and Roger Needham. |
| Decentralized Trust Management, Matt Blaze, Joan Feigenbaum and Jack Lacy, 1996 IEEE. |
| Achieving Electronic Privacy by David Chaum, Scientific American, Aug. 1992. |
| Compliance Defects in Public-Key Cryptography, Don Davis May 29, 1996. |
| Network Security via Private-Key Certificates, Don Davis and Ralph Swick, pp. 64-67. |
| On the Factorization of RSA-120. |
| Establishing Identity Without Certification Authorities, Carl M. Ellison, pp. 67-76. |
| Cryptographic Sealing for Information Secrecy and Authentication, David K. Gifford, Aprik 1982,/vol. 24, No. 4. |
| Payment Switches for Open Networks, David K. Gifford, Lawrence C. Stewart, Andrew C. Payne and G. Winfield Treese, First USENIX Workshop on Electronic Commerce—Jul. 11-12, 1995. |
| Authentication in Distributed Systems: Theory and Practice, Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. |
| Requirements for Network Payment: The NetCheque™ Perspective, B. Clifford Neuman, Gennady Medvinsky, pp. 32-37. |
| Northern Telecom (Nortel) Introduces Web-Based Security Software Product Entrust/WebCA Enables Web Session Security, Nov. 11, 1996, pp. 1-2. |
| The Future of Integer Factorization, Andrew M. Odlyzko, The Technical Newsletter of RSA Laboratories—Summer 1995, pp. 5-12. |
| OM-Transact: A Technical Overview, Oct. 1996, pp. 1-24. |
| Become a CA: Avoid the middleman by Eamonn Sullivan, pp. 1-2, Nov. 11, 1996. |
| CPS Section 5: Validation of Certificate Applications, Apr. 22, 1997. |
| SET Background, May 5, 1998. |