1. Adams, C., and Just, M., PKI: Ten years later. Proceedings of the 3rd Annual PKI R&D Workshop. 69–84, 2004.
2. Al-Nayadi, F., and Abawajy, J. H., An authentication framework for e-Health systems. Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology. 616–620, 2007
3. Chadwick, D. W., Mundy, D., and New, J., Experiences of using a PKI to access a hospital information system by high street opticians. Comput Commun 26:1893–1903, 2003. Elsevier.
4. Ferreira, A., Cruz-Correia, R., Antunes, L., and Chadwick, D., Access Control: How can it improve patients’ healthcare? Stud Health Technol Inform 127:65–76, 2007. IOS Press.
5. Gomes, H., Cunha, J. P., and Zúquete, A., Authentication architecture for eHealth professionals. In: Meersman, R., Tari Z. (Eds.), OTM 2007, Part II, LNCS. Springer. 4804: 1583–1600, 2007.