1. CERtificate VAlidatioN TESt-bed (CERVANTES). http://isg.upc.es/cervantes
2. Adams C, Farrell S (1999) Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510
3. Aho AV, Hopcroft JE, Ullman JD (1988) Data structures and algorithms. Addison-Wesley, Reading, MA
4. Aiello W, Lodha S, Ostrovsky R (1998) Fast digital identity revocation. In: Advances in Cryptology (CRYPTO98), Santa Barbara, 23–27 August 1998. Lecture notes in computer science, vol 1462. Springer, Berlin Heidelberg New York, pp 137–152
5. Arnes A, Just M, Knapskog SJ, Lloyd S, Meijer H (1995) Selecting revocation solutions for PKI. In: Proceedings of NORDSEC ’95