"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communication of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40. |
"Alternatives to RSA Using Diffie-Hellman With DSS", (1996), pub. at http://www.cylink.com/products/security/rsa/rsa-dss2.htm. |
"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40. |
"Alterantives To RSA Using Diffie-Hellman With DSS", (1996), pub. at http://www.cylink.com/products/security/rsa/rsa.dss2.htm. |
"Binding Cryptography. A fraud-detectible alternative to key-escrow proposals", E. Verheul et at., (1996), published at http://cwix.kub.nl./.sup..about. frw/people/koops/binding.htm. |
"Binding the ElGamal Encryption Scheme", E. Verheul et al., (1996), published at http://cwis.dub.nl/.sup..about. frw/people/koops/bindtech.htm. |
"New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654. |
"To Tap or Not To Tap", D. Denning, Communications of the ACM, vol. 36, No. 3, Mar. 1993, pp. 26-33. |