References
- Aladdin, Using EntrustTM Digital Certificates with eToken, 2001, www.eAladdin.com
- Bosworth, K. P. and N. Tedeschi, "Public Key Infrastructures-The Next Generation", BT Technology Journal, Vol.19, No.3, July 2001, pp. 44-59 https://doi.org/10.1023/A:1011982014166
- Chau, J., "Digital Certificates-Is Their Importance Underestimated?", Computer Fraud and Security, December 2005, pp. 14-16
- Chheda, N., The Governing Dynamics of Digital Certificates: The Evaluation of the Adoption of Digital Certificates in the E-Business Environment., Temple University, Fox School of Business, Unpublished research, 2004
- Cisco Systems, Inc., "Certificate Server: Simplifying IPSec VPN Deployment with Digital Certificates", Data Sheet, 2003, pp. 1-2
- Gerck E., "Overview of Certification Systems: X. 509, PKIX, CA, PGP and SKIP", THE BELL, Vol.1, No.3, July 2000, pp. 3-8, (continued on http://www.thebell.net/papers/certover.pdf)
- Gerck, E., Comparison of Secure E-Mail Technologies X.509/PKI, PGP, and IBE. ICFAI University Press, 2007, pp. 171-196
- Hancock, B., "Digital Certificates Get Creative", Computers and Security, Vol.19, No.6, 2000, pp. 480-482 https://doi.org/10.1016/S0167-4048(00)06006-5
- Hunt, R., "Technological Infrastructure for PKI and Digital Certification", Computer Communications, Vol.24, 2001, pp. 1460-1471 https://doi.org/10.1016/S0140-3664(01)00293-6
- IdenTrust, IdenTrust ECA Digital Certificates, The IdentTrust ECA Program, 2007
- Jaweed, S., "Could There Ever Be a Unitary Digital Certificate?", Information Security Technical Report, Vol.8, No.3, 2003, pp. 36-44 https://doi.org/10.1016/S1363-4127(03)00305-4
- Josang, A., D. Povey, and A. Ho, "What You See is Not Always What You Sign", In the proceedings of AUUG2002, Melbourne, September 2002. Vol.4, No.6
- Laudon, K. C. and P. Jane, Management Information Systems, Prentice-Hall, Inc., 2002
- Levi, A., and C. K. Koç6, "Inside Risks: Risks in Email Security", Communications of the ACM, Vol.44, No.8, August 2001, p. 112 https://doi.org/10.1145/381641.381666
- Lioy, A., M. Marian, M. Moltchanova, and M. Palapast, "PKI Past, Present and Future", Vol. 5, No.1, January 2006, pp. 18-29
- Lopez, J., R. Oppliger, and G. Pernul, "Why Have Public Key Infrastructures Failed so Far?", Internet Research, Vol.15, No.5, October 2005, Emerald, Bradford, England
- Mott, S., "The Second Generation of Digital Commerce Solutions", Computer Networks, Vol.32, 2000, pp. 669-683 https://doi.org/10.1016/S1389-1286(00)00024-4
- McKnight, D. H., V. Choudhury, and C. H. Kacmar, "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology", Information Systems Research, Vol.13, No.3, September 2002, pp. 334-359 https://doi.org/10.1287/isre.13.3.334.81
- Nambiar, S., C. H. Lu, and L. R. Liang, "Analysis of Payment Transaction Security in Mobile Commerce", Information Reuse and Integration, Proceedings of the 2004 IEEE International Conference, Vol.8, No.10, 2004, pp. 475-480
- Oracle, Managing E-Business Security Challenges. White Paper, 2002
- Schneier, B., "Two Factor Authentication: Too Little, Too Late", Communications of the ACM, Vol. 48, No.4, April 2005, p. 136 https://doi.org/10.1145/1053291.1053327
- Venter, H. S., J. H. P. Eloff, A Taxonomy for Information Security Technologies, Elsevier, 0167-4048/03, 2003, pp. 299-307
- VeriSign, Digital ID: A Brief Overview, White Paper, 2004
- VeriSign, VeriSign Cable Modem Authentication Service, Data Sheet, 2005a
- VeriSign, VeriSign Microsoft Office/Visual Basic for Applications (VBA) Code Signing Digital Certificates, Business Guide, 2005b
- VeriSign, What Every E-business Knows About SSL Security and Consumer Trust, Business Guide, 2005c
- VeriSign, Maximizing Site Visitor Trust Using Extended Validation SSL, White Paper, 2007
- VeriSign, The Latest Advancements in SSL Technology, White Paper, 2008
- Ward, M., "Digital Certificates and Payment Systems", Information Security Technical Report, Vol.2, No.4, 1998, pp. 23-31 https://doi.org/10.1016/S1363-4127(97)80790-X
- Weise, J., Public Key Infrastructure Overview, SunPSSM Global Security Practice Sun Blue-PrintsTM OnLine, 2001
- Wiedenbeck, S., J. Waters, J. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System", International Journal of Human-Computer Studies, Vol.63, 2005, pp. 102-127 https://doi.org/10.1016/j.ijhcs.2005.04.010
- Wilson, S., "Digital Signatures and Future of Documentation", Information Management and Computer Security, Vol.7, No.2, 1999, pp. 83-87 https://doi.org/10.1108/09685229910265510
- http1, http://www.arx.com/digital-signatures-faq.php
- http2, http://www.computerworld.com/printthis/2001/0,4814,61990,00.html
- http3, http://www.computerworld.com/action/article. do?command = viewArticleTOC&special ReportId = 11&articleId = 62002
- http4, http://www.geotrusteurope.com/enterprise_ssl/enterprise-ssl.htm
- http5, http://publib.boulder.ibm.com/iseries/v5r2/ic2924/index.htm?info/rzahu/rzahutypesofcerts.htm
- http6, http://en.wikipedia.org/wiki/Digital_certificates
- http7, http://www.gsa.gov/aces
- http8, http://www.techagreements.com/agreementreview.aspx?num = 23724&title = Microsoft%20/%20VeriSign%20~%20Preferred%20Provider%20Agreement
- http9, https://www.verisign.com.au/repository/tutorial/digital/intro1.shtml
- http10, https://www.verisign.com/products-services/index.html
- http11, http://www.verisign.com/ssl/buy-ssl-certificates/secure-site-services/index.html
- http12, http://en.wikipedia.org/wiki/Wireless_Application_Protocol
- http13, http://www.securecomputing.com/index.cfm?sKey = 664
- http14, http://www.aladdin.com/etoken/devices/pro-anywhere.aspx
- http15, http://technet.microsoft.com/en-us/library/cc758348.aspx
- http16, http://technet.microsoft.com/en-us/library/cc778623.aspx