1. Lecture notes in computer science;M. Abdalla,2005
2. Al-Riyami, S., & Paterson, K. (2002). Authenticated three party key agreement protocols from pairings (Cryptology ePrint Archive, Report 2002/035).
3. Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.
4. Bellare, M., & Rogaway, P. (1995). Provably secure session key distribution: the three party case. In Proceedings of the ACM symposium on the theory of computing (STOC’95) (pp. 57–66).
5. Boldyreva, A., Palacio, A., & Warinschi, B. (2003). Secure proxy signature schemes for delegation of signing rights (Cryptology ePrint Archive, Report2003/096), http://eprint.iacr.org/ .