“UK Firms Drive Trick Through US Encryption Law.” Newsbytes News Network. Mar. 24, 1997.* |
Bruce Schneier, Applied Cryptography, 2nd ed., p. 48, 1995.* |
E. Rescorla and A. Schiffman, “The Secure HyperText Transport Protocol,” Internet Draft, draft-ietf-wts-shttp-00.txt, Jul. 1995. |
T. Ylonen, “SSH—Secure Login Connections Over the Internet,” USENIX Workshop on Security, 1996. |
P. Karlton, A. Freier and P. Kocher, “The SSL Protocol,” 3.0 Internet Draft, Mar. 1996. |
R. Rivest, “Perspectives on Financial Cryptography,” Invited Lecture, Proc. of Financial Cryptography '97, Springer-Verlag. |
Gabber, P. Gibbons, Y. Matias and A. Mayer, “How to Make Personalized Web Browsing Simple, Secure and Anonymous,” Proceedings of Financial Cryptography '97, Springer-Verlag, 1997. |
A. Aziz and M. Patterson, “Design and Implementation of SKIP (Simple Key Management for Internet Protocols),” Proceedings of the INET '95 Conference, 1995. |
R. Rivest and A. Shamir, “Pay Word and MicroMint: Two Simple Micropayment Schemes,” 4th Cambridge Workshop on Security Protocols, 1996. |
M. Bellare and P. Rogaway, “Entity Authentication and Key Distribution,” Crypto '93 Proceedings, Springer-Verlag. |
“SET: Secure Electronic Transaction Specification,” Book 1: Business Description, Version 1.0, May 1997. |
R. Rivest, “The MDS Message Digest Algorithm,” Internet-RFC 1321, Apr. 1992. |