ANSI X9.30-199x (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA, Jun. 1, 1994, pp. i-86. |
Secure Data Network System, Access Control Specification, Access Control Information Specification (ACIS) Addendum 1 (SDN.802/1), Jul. 25, 198 pp. ii-85. |
Secure Data Network System, Access Control Specification, SDN,802, Rev. 1.0 Jul. 25, 1989, pp. 1.43. |
Secure Data Network System; Access Control Concept Document (Revision 1.3), SDN.801, Jul. 26, 1989, pp. 1-18. |
European Computer Manufacturers Association, Standard ECMA-138 Security in Open Systems --Data Elements and Service Definitions, Dec. 1989, pp. i-81. |
Addison Fischer, Workflow. 2000-Electronic Document Authorization in Practice, Fischer International Systems Corporation, Copyright 1992, 7 pages. |
Richard Ankney, Certificate Management for the Financial Services Industry, Aba/Scitech/Notaization and Nonrepudiation WG. Mtg. of Jul. 1, 1993. |
ANSI X9.30 (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA, Mar. 29, 1993, pp. i-71. |
ANSI X9.30-199x (Working Draft) Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3: Certificate Management of DSA, Sep. 27, 1993, p. i-87. |
Rich Ankney, et al. Enhanced Management Controls Using Attribute Certificates, ASC X9 Project Proposal No. X9F-1-3, Nov. 10, 1993, 13 pages. |
ANSI X9.30-199x (Draft), Executive Summary, Public Key Cryptography Using Irreversibl Algorithms for the Financial Services Industry: Part 3: Certificate Management for DSA Nov. 18, 1993, pp. 1-6. |
ANSI X9.xx-19x (Working Draft) Enhanced Management Controls Using Attribute Certificates, Jan. 3, 1994, pp. 1-18. |
ANSI X9.30-199X (Working Draft) Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry: Part 3. |
PKCS #7: Cryptographic Message Syntax Standard, Version 1.4, Jun. 3, 1991, pp. 1-24. |
Recommendation X 500: The Directory-Overview of Concepts, Models and Services, Melbourne, 1988, pp. 1-13. |
Robert Jueneman, Limiting The Liability of CAs and Individuals Regarding the Use of Digital Signatures, Jun. 30, 1993, pp. 1-8. |
John Linn, Practical Authentication for Distributed Computing, IEEE, 1990, pp. 32-40. |
Morrie Gasser et al, An Architecture for Practical Delegation in a Distributed System, IEEE, 1990, pp. 20-30. |
Denis Pinkas et al. Sesame: Secure European System for Applications in a Multivendor Environment, Issue 1, Feb. 1993. |
J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I, Feb. 1993, pp. 1-42. |
S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II, Feb. 1993, pp. 1-32. |
X1258 Version 2, ASC X-12 Draft Standard . . . Managing Electronic Data Interchange, pp. 1-40. |
Financial Institution Sign-On Authentication for Wholesale Financial Transactions X926, Approved:Feb. 28,1990, pp. 1-25. |
Draft ANSI X9 30-199x, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3, Nov. 18, 1993, pp. 1-6. |
PKCS #7: Cryptographic Message Syntax Standard Version 15, Revised Nov. 1, 1993. |
Information Technology --Open Systems Interconnection-The Directory: Authentication Framework --Recommendation X 509 ISO/IEC 9594-8 (1993), pp. i-35. |
Accredited Standards Committee X9, X9-Financial Services, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry: Part 3, Oct. 7, 1995, pp. i-81. |
Frank Sudia and Richard Ankney, Commercialization of Digital Signatures, July 20 Boston, pp. 1-16. |
Addison M. Fischer, Electronic Document Authorization, National Computer Security Conference, 1992, pp. 1-23. |
ECMA --Standard ECMA-138 --Security In Open Systems --Data Elements and Service Definitions, Dec. 1989, pp. i-81. |
ECMA --Security in Open Systems A Security Framework, ECMA TR/46, Jul. 1988, pp. i-71. |