1. D. Eastlake. Domain name system security extensions. IETF RFC2535, March 1999.
2. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI certifiacte theory. IETF RFC 2693, September 1999.
3. C. Ellison and B. Schneier. Ten risks of PKI: What you are not being told about public key infrastructure. Computer Security Journal, 16 (1): 1–7, 2000.
4. C. Gamage, J. Leiwo, and Y. Zheng. An efficient scheme for secure message transmission using proxy-signcryption. In Proc. 22nd Australasian Computer Science Conference, A CSC’99, Australian Computer Science Communications Vol.21, Nr.1, Springer—Verlag, 1999.
5. S. Kim, S. Park, and D. Won. Proxy signatures revisited. In Proc. First International Conference on Information and Communications Security, ICICS’97, LNCS 1334, Springer—Verlag, 1997.