1. Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile (1999)
2. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: ACM Conference on Computer and Communications Security, pp. 48–57 (1996)
3. Mambo, M., Okamoto, E.: Proxy cryptosystem: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals E80-A(1), 54–63 (1997)
4. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: SCIS, pp. 603–608 (2001)
5. RSA Laboratories: PKCS #11: Cryptographic Token Interface Standard, http://www.rsa.com/rsalabs/node.asp?id=2133