1. Self-certified public keys;Girault,1991
2. Identity-based cryptosystems and signature schemes;Shamir,1984
3. Contemporary Cryptology: The Science of Information Integrity;Simmons,1992
4. A Method for Certification;Kohnfelder,1978
5. Authentication and protection of public keys;Laih;Computers & Security,1994