8Jakmosh I G, Kocarev Li. Chaos-based Cryptography.a brief overview[J].IEEE Circuits and Systems,2001,48(2): 167-170.
9LI JIANGTAO, Ll NINGHUI. OACerts: Oblivious attribute certifi-cates[ C ]// Proceedings of the Third Conference on Applied Cryp-tograpby and Network Security. New York: ACM, 2003. 108 121.
10YU T, WINSLETI' M. A unified scheme for resource protection in automated trust negotiation [ C ]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:245-257.