1. National Strategy for Trusted Identities in Cyberspace,
http://www.nist.gov/nstic
2. Soghoian, C.: Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era. 8 J. on Telecomm. and High Tech. L. 359,
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1421553
3. SPKI/SDSI Certificates,
http://world.std.com/~cme/html/spki.html
4. Anderson, R., Murdoch, S.: Verified by Visa and MasterCard SecureCode—or, How Not to Design Authentication. Financial Cryptography (2010),
http://www.cl.cam.ac.uk/~rja14/Papers/fc10vbvsecurecode.pdf
5. Sun, S.-T., Boshmaf, Y., Hawkey, K., Beznosov, K.: A Billion Keys, but Few Locks: The Crisis of Web Single Sign-On. LERSSE-RefConfPaper-2010-006,
http://lersse-dl.ece.ubc.ca/record/244