1. Kohl, J.T., Neuman, B.C., Ts’o, T.Y.: The Evolution of the Kerberos Authentication Service, pp. 78–94. IEEE Computer Society Press (1994)
2. VeriSign, Inc.: VeriSign Certification Practice Statement (2009),
http://www.verisign.com/repository/CPS/
3. Potter, B.: Dangerous URLs: Unicode & IDN (2005),
http://www.sciencedirect.com/science/article/B6VJG-4FVC3YD-6/2/9d0fa84d322964a8c9ac42cba2936dea
4. Abdul-Rahman, A.: The PGP Trust Model. The Journal of Electronic Commerce 10(3), 27–31 (1997)
5. Jsang, A.: An Algebra for Assessing Trust in Certification Chains. In: Network and Distributed Systems Security Symposium (NDSS 1999), San Diego, USA (1999)