1. D. Chaum, “Security without identification: Transaction systems to make big brother obsolete,” Communications of the ACM, Vol. 28, Oct. 1985, pp. 1030–1044.
2. A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Presented at Crypto’86, Santa Barbara, CA, Aug. 11–15, 1986, pp. 18–1 thru 18–7 of the Conference Abstracts and Papers.
3. O. Goldreich, S. Micali and A. Wigderson, “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design,” In The Computer Society of IEEE. 27th Annual Symp. on Foundations of Computer Science (FOCS), pp. 174–187, IEEE Computer Society Press (1986). Toronto, Ontario, Canada, Oct. 27–29. 1986.
4. P. D. Merillat, “Secure stand-alone positive personnel identity verification system (SSA-PPIV),” Sandia National Laboratories Tech. Rpt. SAND79-0070 (March).
5. G. J. Simmons, “A system for verifying user identity and authorization at the point-of-sale or access,” Cryptologia, Vol. 8, No. 1, January 1984, pp. 1–21.