Kaufman, A., et al., “Network Security: Private Communication in a Public World,” Section 7.7.3., Prentice Hall (1995). |
Aho, A.V., et al., “Data Structure and Algorithms,” pp. 169-180, Addison-Wesley (1983). |
Seidel, R., et al., “Randomized Search Trees,” University of California Berkeley, Computer Science Division, Nov. 27,1994. |
Bellare, M., et al., “Collision-Resistant Hashing: Towards Making UOWHFs Practical,” University of California at San Diego and Davis, Department of Computer Science, Jul. 17, 1997. |
Even, S., et al., “On-Line/Off-Line Digital Signatures,” Journal of Cryptology 9:35-67 (1996). |
Goldreich, O., et al, “Collision-Free Hashing from Lattice Problems,” MIT-Laboratory for Computer Science, Oct. 3, 1996. |
Herzberg, A. et al., “Mini-Pay: Charging per Click on the Web,” IBM Research Lab, Tel Aviv Annex. |
Kocher, P., “A Quick Inroduction to Certificate Revocation Trees (CRTs)”. |
Merkle, R.C., “A Certified Digital Signautre,” Xerox PARC, Palo Alto, CA. |
Micali, S., “Efficient Certificate Revocation,” MIT-Laboratory for Computer Science, Mar. 22, 1996. |
Naor, M., et al., “Certificate Revocation and Certificate Update,” Weizman Institute of Science, Dept. of Applied Mathematics and Computer Science. |