11400 Hal Abelson a.o.: The risks of key recovery, key escroww, and trusted third-party encryption. Internet 1997. 7638 Martin Dyer/Trevor Fenner/Alan Frieze/Andrew Thomason: On key storage in secure networks. J. Cryptology 8 (1995), 189-200. 11307 Hannes Federrath/Anja Jerichow/Andreas Pfitzmann/Birgit Pfitzmann: Mehrseitig sichere Schlu''sselerzeugung. In Horster 1995, 117-131. 8167 Michael Fischer/Rebecca Wright: Bounds on secret key exchange using a random deal of cards. J. Cryptology 9 (1996), 71-99. Dirk Fox: Das Royal-Holoway-System. Datenschutz u. Datensicherheit 1998/1, ... S. Fumy/P. Landrock: Principles of key management. IEEE ... June 1993, ... Patrick Horster (ed.): Trust Center '95 Siegen. Vieweg 1995. 11245 Stefan Lucks: Open key exchange - how to defeat dictionary attacks without encrypting public keys. Internet 1997, 12p. C. Meyer/S. Matyas: Cryptography. Wiley 1982. 7590 Douglas Stinson: On some methods for unconditionally secure key distribution and broadcast encryption. Internet 1995, 30p.