[FeghhiFeghhiWilliams1999] Jalal Feghhi, Jalil Feghhi, and Peter Williams, 1999, 0-201-30980-7, Addison-Wesley Publishing Company, Digital Certificates.

[GarfinkelSpafford1999] Simson Garfinkel and Gene Spafford, 1997, 1-56592-269-7, Edited by Deborah Russell, O'Reilly & Associates, Inc., Web Security & Commerce.

[MenezesOorschotVanstone1997] Alfred Menezes, Paul van Oorschot, and Scott Vanstone, 1997, 0-8493-8523-7, CRC Press LLC, Handbook of applied cryptography.

[Schneier1995] Bruce Schneier, 1995, 0-4711-1709-9, John Wiley & Sons, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition.

[WalshMuellner1999] Norman Walsh and Leonard Muellner, 1999, 1-56592-580-7, O'Reilly & Associates, Inc., DocBook: The Definitive Guide.


[Walsh1997] XML: Principles, Tools, and Techniques, O'Reilly & Associates, Inc., 1085-2301, Edited by Dan Connolly, "A Guide to XML", Norman Walsh, 1997, 97-108.

[EllisonSchneier2000] Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure, Computer Security Institute, "Ten risks of PKI: What You're not Being Told about Public Key Infrastructure", Carl Ellison, Bruce Schneier, 2000.

[Gollmann2000] On the Verification of Cryptographic Protocols - A Tale of Two Committees, Elsevier Science B. V., "Electronic Notes in Theoretical Computer Science", Dieter Gollmann, 2000.