1. Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Public key infrastructure: Certificate and CRL profile, IETF, Tech. Rep. RFC 5280 (2008)
2. Aarnes, A.: Public key certificate revocation schemes, Ph.D. dissertation, Norwegian University of Science (2000)
3. ETSI, Algorithms and parameters for secure electronic signatures; part 1: Hash functions and asymmetric algorithms, Tech. Rep. ETSI TS 102 176-1 V2.0.0 (2007)
4. Jerman Blaič, A., Klobučar, T., Jerman, B.D.: Long-term trusted preservation service using service interaction protocol and evidence records. Comput. Stand. Interfaces 29 (2007)
5. Huhnlein, D., Korte, U., Langer, L., Wiesmaier, A.: A comprehensive reference architecture for trustworthy long-term archiving of sensitive data. In: Third International Conference on New Technologies, Mobility and Security (2009)