| Sudia, Frank, et al., “Commercialization of Dual Signatures”, pp. 1-16, (1993). |
| Garfinkel, Simson, “PGP: Pretty Good Privacy”, Mar. 1995, pp. 13-14.* |
| T. Beth, M. Borcherding, and B. Klein. “Valuation of Trust in Open Networks”, In D. Gollman, ed., Computer Security—ESORICS '94 (Lecture Notes in Computer Science 875), pp. 3-18, Springer-Verlag, 1994.* |
| L. R. Ford, Jr. and D. R. Fulkerson. “Maximal Flow through a network”, Canadian Journal of Mathematics 8:399-404, 1956.* |
| U. Maurer. “Modeling a public-key infrastructure”, In E. Bertino, H. Kurth, G. Martella, and D. Montolivo, ed., Computer Security—ESORICS '96 (Lecture Notes in Computer Science 1146), Springer-Verlag, 1996.* |
| M. K. Reiter and S. G. Stubblebine. “Path independence for authentication in large-scale systems”, In Proceedings of the 4th ACM Conference on Computer and Communications Security, Apr. 1997. |
| A. Tarah and C. Huitema. “Associating metrics to certification paths”, In Computer Security—ESORICS '92 (Lecture Notes in Computer Science 648), pp. 175-189, Springer Verlag, 1992. |
| M. K. Reiter and S. G. Stubblebine. “Toward Acceptable Metrics of Authentication”, In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997. |
| “Companies Need Certificate Interoperability: Certificate Authorities Positioning To Instill Peace of Mind”, Electronic Commerce News vol: 2 Issue: 13, Mar. 31, 1997. |
| Draft Oregon Administrate Rules. Registration of Authentication Authorities. Dec. 1997.* |
| McAndrews, James J. Making payments on the Internet. Business Review—Federal Reserve Bank of Philadelphia; Philadelphia. Jan./Feb. 1997.* |
| Lai et al. Endorsements, Licensing, and Insurance for Distributed System Services. Presented at MIT Workshop on Internet Economics Mar. 1995.* |
| The State of Utah in Senate Bill 188 Digital Signature Act Amendments. Mar. 1996. pp. 1-34.* |
| ITU-T Recommendation X.509. Information Technology—Open Systems Interconnection—The Directory: Authentication Framework. Nov. 1993. |