1. Lect Notes Comput Sci;W. Aiello,1998
2. Lect Notes Comput Sci;J.H. An,2002
3. Lect Notes Comput Sci;P.S.L.M. Barreto,2002
4. M. Bellare and A. Palacio. Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Available at
http://eprint.iacr.org
, 2002.
5. D. Boneh, X. Ding, G. Tsudik, M. Wong. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In Proc. of 10th Annual USENIX Security Symposium, 2001, available at
http://crypto.stanford.edu/~dabo/pubs.html
.