Information Technology Reference
In-Depth Information
7. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In
Selected
Areas in Cryptography
(1999) 184-199
8. Mjolsnes, S.Fr.: Privacy, cryptographic pseudonyms, and the state of health.
Lec-
ture Notes in Computer Science
739 (1993)
9. Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability, and pseudonymity —
a proposal for terminology.
In
Workshop on Design Issues in Anonymity and
Unobservability
(2000) 1-9
10. Rankl, W., Eng, W.:
Smart Card Handbook, 3rd edition
. John Wiley & Sons
(2003)
11. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems.
Communications of the ACM
, 21 (1978) 120-126
12. RSA Laboratories. RSA-576 is factored!.
http://www.rsasecurity.com/rsalabs/node.asp?id=2096
13. RSA Laboratories. The RSA Challenge Numbers.
http://www.rsasecurity.com/rsalabs/node.asp?id=2093
14. Schartner, P.:
Security Tokens - Basics, Applications, Management, and In-
frastructures
. IT-Verlag (2001)