1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (Ed.) ASIACRYPT 2003, LNCS, vol. 2894, pp. 452–473. Springer, Berlin (2003)
2. American National Standard for Financial Services: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (ANS X9.62-2005) (2005)
3. Atkins, D., Stallings, W., Zimmermann, P.: PGP Message Exchange Formats. RFC 1991 (Informational) (1996). http://www.ietf.org/rfc/rfc1991.txt , obsoleted by RFC 4880
4. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS 2002. The Internet Society (2002)
5. Bassham, L., Polk, W., Housley, R.: Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279 (Proposed Standard) (2002). http://www.ietf.org/rfc/rfc3279.txt , updated by RFCs 4055, 4491, 5480, 5758