1. Lecture Notes in Computer Science;B. Monahan,2003
2. Dalton, C.I., Griffin, J.: Applying military grade security to the internet. In: Joint European Networking Conference, Edinburgh (1997)
3. Baldwin, A., Beres, Y., Casassa Mont, M., Shiu, S.: Trust services: Reducing risk in e-commerce. In: Proceedings of the International Conference on E-Commerce Research (2001)
4. Baldwin, A., Shiu, S., Casassa Mont, M.: Trust services: A framework for service based solutions. In: 26th IEEE Computer Software and Applications Conference (COMPSAC), Oxford, UK (2002)
5. Haber, S., Stornetta, W.S.: How to time-stamp a digital document. Journal of Cryptology 3, 99–111 (1991)