prev up next

8. Literatur

[1]
R. Rivest, A. Shamir, L. Adleman: A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, Vol. 21, N. 2, 1978, S. 120-126.

[2]
David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete, Communications of the ACM, Vol. 28, N. 10, 1985, pp. 1030-1044; Revised version (in German), Informatik-Spektrum, vol. 10, 1987, pp. 262-277 1987.


prev up next