"Applied Cryptogrophy", Bruce Schneier, 1994, John Wiley and Sons, pp. 1-15. |
"Certificate Extensions Architecture Document", Jul. 7, 1995 Draft, Intel Corporation, pp. 1-10. |
"Confidential Communication On the Internet", Thomas Beth, Scientific American, pp. 88-91, Dec. 1995. |
"Cryptology in Cyberspace", Edward J. Radlo, New Matter, The Official Pulication of the State Bar of California Intellectual Property Association, vol. 20, No. 3, pp. 44-48. |
CCITT Recommendation X.509, The Directory-Authentication Framework, Melbourne, 1988, pp. 48-81. |
"A Layman's Guide to a Subset of ASN.1, BER, and DER", RSA Labs Technical Note, Version 1.5, 11-93 revision, pp. 1-36. |
"PKCS #6: Extended-Certificate Syntax Standard", TSA Labs Technical Note, Version 1.5, Nov. 1993 Revision, pp. 1-11. |
"Some Examples of the PKCS Standards", RSA Labs Technical Note, Burton S. Kaliski Jr., Nov. 1993, Revision, pp. 1-15. |