1. Gon, J., Liu, J.: Research on the Methods of PKI Extention Based on Path Findings. Computer Engineering and Science 22(4), 1–3 (2000)
2. Bassham, L., Polk, W., Housley, R.: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List, Profile (2002)
3. LGhosh, R.K., Bhattachar Jee, G.P.: Parallel breadth first Search algorithms for trees and graphs. Inter. J. Computer (12), 255–268 (1996)
4. Housley, R., Ford, W., Polk, W.: Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. Internet Request for Comments 3280 (2002)
5. Wang, X., Wang, S., Xiang, C.: The Path Construction Algorithm in PKI Infrastructure. Computer Engineering 28(6), 69–70 (2002)