1. Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in Cryptology-ASIACRYPT 2003. Springer Berlin Heidelberg.
2. Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Gianoli, A., Spataro, F., Bonnassieux, F., Broadfoot, P. J., Lowe, G., Cornwall, L., Jensen, J., Kelsey, D. P., Frohner, Á., Groep, D. L., de Cerff, W. S., Steenbakkers, M., Venekamp, G., Kouril, D., McNab, A., Mulmo, O., Silander, M., Hahkala, J., and Lörentey, K. (2003). Managing dynamic user communities in a grid of autonomous resources. CoRR, cs.DC/0306004.
3. Aranha, D. F., Oliveira, L. B., López, J., and Dahab, R. (2009). NanoPBC: implementing cryptographic pairings on an 8-bit platform. In Conference on Hyperelliptic curves, discrete Logarithms, Encryption, etc (CHiLE 2009).
4. Blobel, B. (2010). Architectural Approach to eHealth for Enabling Paradigm Changes in Health. Methods of Information in Medicine, 49(2):123–134.
5. Boneh, D. and Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology—CRYPTO 2001.