| Needham et al, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 993-999. |
| Chor et al., "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", Extended Abstract, IEEE, 1985, pp. 383-395. |
| Even, S., "Secure Off-Line Electronic Fund Transfer Between Nontrusting Parties", Abstract, Jan. 31, 1988, 10 pps. |
| Shamir, A., "How to Share a Secret", Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 612-613. |
| Chaum, D., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, vol. 24, No. 2, Feb. 1981, pp. 84-88. |
| Desmedt et al., "Threshold cryptosystems", EE & CS Department, University of Wisconsin-Milwaukee. |
| Rabin, M., "How to Exchange Secrets", May 20, 1981, pp. 1-21. |
| Kolata, G., "Cryptographers Gather to Discuss Research-Analyses of how to break codes and new ways to use codes were featured at the meeting", Science, vol. 214, Nov. 6, 1981, pp. -646-647. |
| Blum, M., "How to Exchange (Secret) Keys", ACM Transactions on Computer Systems, vol. 1, No. 2, May 1983, pp. 175-193. |
| Luby et al., "How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin", IEEE, 1983, pp. 11-21. |
| Even et al., "A Randomized Protocol for Signing Contracts", Communications of the ACM, vo. 28, No. 6, Jun. 1985, pp. 637-647. |
| Goldreich et al., "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority", Proceedings of the 27th Annual IEEE ACM Symposium on Theory of Computing, May 1987, pp. 218-229. |
| Goldwasser et al., "The Knowledge Complexity of Interactive Proof Systems", Siam Journal of Computing, vol. 18, No. 1, Feb. 1989, pp. 186-208. |
| Damgard, I., "Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals", Extended Abstract, pp. 328-335, Proceedings of Crypto '88. |
| Chaum et al., "Untraceable Electronic Cash", Extended Abstract, pp. 319-327, Proceedings of Crypto '88. |
| Dolev et al., "Non-Malleable Cryptography", Extended Abstract, Communications of the ACM, Mar. 1991, pp. 542-552. |
| Batelaan et al., "Internet Billing Service Design and Prototype Implementation", Carnegie Mellon University Information Networking Institute 1992 Final Project, Mar. 30, 1993, 16 pps. |
| Burk et al., "Digital Payment Systems Enabling Security and Unobservability", Computers & Security, vol. 8, 1989, pp. 399-416. |
| Rabin, M., "Transaction Protection by Beacons", Harvard University, Cambridge, MA, Nov. 1981, 21 pps. |
| Ben-Or et al., "A Fair Protocol for Signing Contracts", IEEE Transactions On Information Theory, vol. 36, No. 1, Jan. 1990, pp. 40-46. |
| Rivest, et al., "A Method for Obtaining Digital Signatures and Public--Key Cryptosystems," Communications of the ACM, Feb. 1978, pp. 120-126. |
| Goldreich et al., "Proofs That Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems", Journal of the Association for Computing Machinery, vol. 38, No. 1, Jul. 1991, pp. 691-729. |
| Low, Steven H., "Anonymous Credit Cards," Proceedings of the 2nd ACM Cocnference on Computer and Communication Security, Fairfax, Virginia, Nov. 2-4, 1994, pp. 1-10. |
| Sirbu, Marvin, "NetBill: An Internet Commerce system Opitmized for Network Delivered Services," Carnegie Mellon University, Pittsburgh, Pennsylvania. |
| Bellare, Mihir, "iKP--A Family of Secure Electronic Payment Protocols" (Extended Abstract), Jul. 12, 1995, pp. 1-21. |
| Pedersen, Torben P., "Electronic Payments of Small Amounts," Computer Science Department, Aarhus University. |
| Chaum, David, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Communications of the ACM, Oct. 1985, vol. 28 at 1032-1033. |
| Dukach, Semyon, "SNPP: A Simple Network Payment Protocol," MIT Laboratory for Computer Science. |
| Cheng, Pau-Chen, "Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX," IBM Thomas J. Watson Research Center, Apr. 28, 1995. |
| Janson, P., "Electronic Payment Over Open Networks," IBM Zurich Research Laboratory, Apr. 18, 1995. |
| Hickman, Kipp E.B., "Standards Documentation: The SSL Protocol," Netscape Communications Corporation, Jun. 1995. |
| Rescorla, E., "The Secure HyperText Transfer Protocol," Enterprise Integration Technologies, Jul. 1995. |
| Neuman, Clifford B., "Requirements for Network Payment: The NetCheque.TM. Perspective," Proceedings of the IEEE Compcon '95, San Francisco, Mar. 1995. |
| Stein, Lee H., "The Green Commerce Model," Stein, Stefferud, Borenstein, Rose, Oct. 1994, pp. 1-18. |