"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40. |
"Alternatives To RSA Using Diffie-Hellman With DSS", (1996) , pub. at http:// www.cylink.com/products/security/rsa/rsa-dss2. htm. |
Applied Cryptography(Second Edition 1996) Bruce Schneier, John Wiley & Sons, Inc., New York pp. 70-71. |
"Binding Cryptography. A fraud-detectible alternative to key-escrow proposals", E. Verheul et at. (1996), published at http:// cwix.kub.nl/.about.frw/people/koops/binding.htm. |
"Binding the ElGamal Encryption Scheme", E. Verheul et al., (1996) , published at http://cwis.dub.nl/.about.frw/people/koops / bindtech.htm. |
"New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654. |
Public Key Infrastructure "Binding Cryptography --A Fraud-Detectible Alternative to Key-Escrow Proposals" E. Verheul et al., Computer Law & Security Report, vol. 13, No. 1, 1997, pp. 3-14. |
"To Tap of Not To Tap", D. Denning, Communications of the ACM, vol. 36, No. 3, Mar. 1993, pp. 26-33. |