1. ABA (1996). Digital Signature Guidelines. American Bar Association.
2. Adams, C. and Lloyd, S. (1999). Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations. Macmillan Technical Publishing, Indianapolis, Indiana.
3. Anderson, R. J. (1994a). Liability and Computer Security-Nine Principles. In Proceedings of the Third ESORICS, volume 875 of Lecture Notes in Computer Science, pages 231–245. Springer-Verlag.
4. Anderson, R. J. (1994b). Why Cryptosystems Fail. Communications of the ACM, 37:32–40.
5. Berkovits, S., Chokhani, S., Furlong, J. A., Geiter, J. A., and Guild, J. C. (1994). Public key infrastructure study: Final report. Technical report, Mitre Corporation.