1. Arends, R., Austein, R., Larson, M., Massey, D., & Rose, S. (2005). RFC 4033 - DNS security introduction and requirements. Retrieved from http://www.rfc-editor.org/
2. Bellovin, S. M. (1995). Using the domain name system for system break-ins. In Proceedings of the Fifth Usenix Unix Security Symposium. IEEE.
3. Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A. D. (1999). RFC 2704 – The keynote trust management system version 2. Retrieved from http://www.ietf.org/rfc/rfc2704.txt
4. Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007). RFC 4880 - OpenPGP message format. Retrieved from http://www.rfc-editor.org/
5. Certificate chain discovery in SPKI/SDSI.;D.Clarke;Journal of Computer Security,2001