1 |
Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, 'Time-Stamping With Binary Linking Schemes,' Crypto '98, http://home.cyber.ee/helger/papers/bllv98.html
|
2 |
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 'Handbook of Applied Cryptography,' July, 1999, CRC Press, http://cacr.math.uwaterloo.ca/hac/
|
3 |
A. Michael Froomkin, 'The essential role of Trusted Third Parties in Electronic Commerce,' 75 Oregon L. Rev. 49, 1996, http://www.law.miami.edu/~froomkin/articles/trusted1.htm
|
4 |
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers, 'Optimally Efficient Accountable Time-Stamping,' PKC 2000, http://home.cyber.ee/helger/papers/bls00.html
|
5 |
Josh Benaloh and Michael de Mare, 'Efficient Broadcast Time-Stamping,' Microsoft Research Lab., http://www.research.microsoft.com/crypto/papers/tss.ps
|
6 |
Mike Just, 'Techniques for Digital Timestamping,' available at http://www.scs.carleton.ca/~just/papers/CAMS97_slides.ps
|
7 |
Bruce Schneier, 'Applied Cryptography-Protocols, Algorithms and Source Code in C,' John Wiley & Sons, 1994
|
8 |
Chiara Bulgarelli, 'Tecniche di Time-Stamping,' (in italian), available at http://www.cs.unibo.it/~bulgarel/homepg/critto.html
|
9 |
Helger Lipmaa, 'Digital Signatures and Authentication,' version 2.0, June, 1999, Cybernetica, available at http://www.cyber.ee/infosecurity/resources/auth/
|
10 |
Netscape Communications Corporation, 'Introduction to Public-Key Cryptpgraphy,' available at http://www.iplanet.com/developer/docs/articles/security/pki.thml
|
11 |
Stuart Haber and Wakefield Scott Stornetta, 'How to Time-Stamp a Digital Document,' Journal of Cryptology, Vol.3, No.2, pp.99-111, 1991
DOI
|
12 |
Stuart Haber, Kaliski, W. Scott Stornetta, 'How Do Digital Time-Stamps Support Digital Signatures?,' Cryptobytes ( The RSA security magazine), available at ftp://ftp.rsa.com/pub/cryptobytes/crypto1n3.pdf
|