J. Lopez, R. Oppliger, and G. Pernul, Why have public key infrastructures failed so far?, Internet Research, vol.15, issue.5, pp.544-556, 2005.
DOI : 10.1007/BFb0055482

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.7734

P. Gutmann, PKI: it's not dead, just resting, Computer, vol.35, issue.8, pp.41-49, 2002.
DOI : 10.1109/MC.2002.1023787

I. Recommendation and X. , Information Technology -Open Systems Interconnection -The Directory: Public-key and Attribute Certificate Frameworks, 2000.

I. Verisign, VeriSign Certification Practice Statement Version 3, 2009.

J. Iliadis, S. Gritzalis, D. Spinellis, D. De-cock, B. Preneel et al., Towards a framework for evaluating certificate status information mechanisms, Computer Communications, vol.26, issue.16, pp.1839-1850, 2003.
DOI : 10.1016/S0140-3664(03)00079-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.4411

S. Micali, Efficient Certificate Revocation, Massachusetts Institute of Technology, 1996.

S. Micali, NOVOMODO: Scalable Certificate Validation and Simplified PKI Management, 2002.

J. L. Munoz, J. Forn, O. Esparza, and B. M. Soriano, Using OCSP to Secure Certificate-Using Transactions in M-commerce, p.ACNS, 2003.

D. Berbecaru, MBS-OCSP: an OCSP based certificate revocation system for wireless environments, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004., 2004.
DOI : 10.1109/ISSPIT.2004.1433737

W. Aiello, S. Lodha, and R. Ostrovsky, Fast digital identity revocation, p.CRYPTO, 1998.
DOI : 10.1007/BFb0055725

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3886

P. C. Kocher, On certificate revocation and validation, In: Financial Cryptography, 1998.
DOI : 10.1007/BFb0055481

M. Naor and K. Nissim, Certificate revocation and certificate update, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 1998.
DOI : 10.1109/49.839932

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.5235

V. Goyal, Certificate Revocation Using Fine Grained Certificate Space Partitioning, In: Financial Cryptography and Data Security, 2007.
DOI : 10.1007/978-3-540-77366-5_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5123

J. A. Solworth, Instant Revocation, European PKI workshop on Public Key Infrastructure: Theory and Practice, 2008.
DOI : 10.1007/978-3-540-69485-4_3

J. A. Solworth, Beacon certificate push revocation, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, 2008.
DOI : 10.1145/1456508.1456519

K. Scheibelhofer, PKI without Revocation Checking, In: PKI R&D Workshop, 2005.

A. Lioy, M. Marian, N. Moltchanova, and M. Pala, PKI past, present and future, International Journal of Information Security, vol.26, issue.16, pp.18-29, 2006.
DOI : 10.1109/MC.2002.1023787

T. Lim and A. Lakshminarayanan, On the Performance of Certificate Validation Schemes Based on Pre-Computed Responses, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, p.GLOBECOM, 2007.
DOI : 10.1109/GLOCOM.2007.42

P. Zheng, Tradeoffs in certificate revocation schemes, ACM SIGCOMM Computer Communication Review, vol.33, issue.2, pp.103-112, 2003.
DOI : 10.1145/956981.956991

P. Hormann, T. Wrona, K. Holtmanns, and S. , Evaluation of certificate validation mechanisms, Computer Communications, vol.29, issue.3, pp.291-305, 2006.
DOI : 10.1016/j.comcom.2004.12.008

M. Jakobsson, Fractal hash sequence representation and traversal, Proceedings IEEE International Symposium on Information Theory,, pp.437-444, 2002.
DOI : 10.1109/ISIT.2002.1023709

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8174