1. Jancic, A., Warren, M.J.: PKI - Advantages and Obstacles. In: 2nd Australian Information Security Management Conference (2004)
2. Peyravian, M., Roginsky, A., Zunic, N.: Non-PKI Methods for Public Key Distribution. Computers & Security 23, 97–103 (2004)
3. Lecture Notes in Computer Science;A. Shamir,1985
4. Lecture Notes in Computer Science;S.S. Al-Riyami,2003
5. Terada, R., Denise, H.G.: A Certificateless Signature Scheme based in Bilinear Pairing Functions. In: Symposium on Cryptography and Information Security (2007)