1: \begin{thebibliography}{10}
2:
3: \bibitem{DNSspoof}
4: Steven~M. Bellovin.
5: \newblock Using the domain name system for system break-ins.
6: \newblock In {\em Proceedings of the Fifth {USENIX UNIX} Security Symposium},
7: pages 199--208. The {USENIX} Assoziation, June 1995.
8:
9: \bibitem{rfc2535}
10: D.~Eastlake.
11: \newblock { Domain Name System Security Extensions}.
12: \newblock {RFC}, Internet Engineering Task Force, March 1999.
13: \newblock {RFC} 2535.
14:
15: \bibitem{Bellovin}
16: Steven~M. Bellovin.
17: \newblock Using bloom filters for authenticated yes/no answers in the {DNS}.
18: \newblock
19: \url{http://www.research.att.com/~smb/papers/draft-bellovin-dnsext-bloomfilt%
20: -00.txt}, December 2001.
21:
22: \bibitem{undeniable}
23: D.~Chaum and H.~van Antwerpen.
24: \newblock Undeniable signatures.
25: \newblock In {\em Advances in Cryptology --- {CRYPTO'{}89} Proceedings}, pages
26: 212--216. Springer--Verlag, 1990.
27: \newblock {LNCS} 435.
28:
29: \bibitem{hashtree}
30: Ralph Merkle.
31: \newblock Protocols for public key cryptosystems.
32: \newblock In {\em Proceedings of the {IEEE} Symposium on Research in Security
33: and Privacy}, April 1980.
34:
35: \bibitem{buldasold}
36: Ahto Buldas, Peeter Laud, and Helger Lipmaa.
37: \newblock Accountable certificate management using undeniable attestations.
38: \newblock In {\em 7th {ACM} Conference on Computer and Communications
39: Security}, pages 9--18. {ACM} Press, November 2000.
40:
41: \bibitem{buldas}
42: Ahto Buldas, Peter Laud, and Helger Lipmaa.
43: \newblock Eliminating counterevidence with applications to accountable
44: certificate management.
45: \newblock {\em Journal of Computer Security}, 2002.
46:
47: \bibitem{Knuthsearch}
48: Donald~E. Knuth.
49: \newblock {\em The Art of Computer Programming}, volume 3: Sorting and
50: Searching, chapter~6.
51: \newblock Addison--Wesley, 2 edition, 1998.
52:
53: \bibitem{zks}
54: Silvio Micali, Michael~O. Rabin, and Joe Kilian.
55: \newblock Zero-knowledge sets.
56: \newblock In {\em 44th Annual {IEEE} Symposium on Foundations of Computer
57: Science (FOCS'03)}, pages 80--91, 2003.
58:
59: \end{thebibliography}
60: