1. Anderson, R. (1997). Proceedings of Fourth Annual Conference on Computer and Communication Security, ACM Press.
2. Anderson, R. (2000). Two Remarks on Public-Key Cryptology, University of Cambridge. UCAM-CL-TR-549.
3. Burmester, M., and Chrissikopoulos, V. (2001). IFIP International Information Security Conference, Kluwer Academics Publishers. IFIP-SEC2001 Conference.
4. A Dynamic Threshold Signature Scheme with Strong Forward Security;Cheng;Comput. Eng. Appl.,2020
5. Privacy-aware PKI model with strong forward security;Li;Int. J. Intell. Syst.,2020