1John Linn.Trust Model and Management in Public-Key Inrfrastructures[EB/OL],Technical Report,6 November.2000.ftp://ftp.rsasecurity.com/pub/pdfs/PKIPaper.pdf.
2卢开澄.计算机密码学[M].北京:科学出版社.1999.
3D.Bruschi,A.Curti,E.Rosti.A quantitative study of Public Key Infrastructure[J].Computers & Security.2003.
4Burr W.E.Public Key Infrastructure(PKI)Technical Specification:Part A-Technical Concept of Operations[DB/OL].Working Draft,4 September 1998.http://csrc.nist.gov/pki/twg/baseline/pkicong20b.pdf.
5Ray Hunt,Technological Infrastructure for PKI and Digital Certification[J].Computer Communications,2001.
6Andrew Nash,William Duane,Celia Joseph,and Derek Brink.PKI:ImPlementing and Managing E-Security[M].Osborne/McGraw-Hill.2003.