1. Lecture Notes in Computer Science;S.-y. Lee,2005
2. Common Criteria, Common Criteria for Information Technology Security Evaluation;part 1: Introduction and general model, Version 3.1 R1, CCMB-2006-09-001 (September 2006)
3. Common Criteria, Common Criteria for Information Technology Security Evaluation;part 2: Security functional components, Version 3.1 R2, CCMB-2007-09-002 (September 2007)
4. Common Criteria, Common Criteria for Information Technology Security Evaluation;part 3: Security assurance components, Version 3.1 R2, CCMB-2007-09-003 (September 2007)
5. Lee, K., Won, D., Kim, S.: A Secure and Efficient E-Will System Based on PKI. Information - An International Interdisciplinary Journal, International Information Institute 14(7), 2187–2206 (2011)