2Lee Byung-Gil,et al. Concatenated wireless roaming security association and authentication protocol using ID-based cryptography. IEEE Vehicular Technology Conference, 57(3):2003,1507-1511.
3Russell Selwyn 等. Virtual Certificates And Synthetic Certificates:New Paradigms for Improving Public Key Validation. Computer Communications, v 26, n 16 SPEC, Oct 15,2003,1826-1838.
4Forne,Jordi等. Web-based Authorization based on X. 509 Privilege Management Infrastructure. IEEE Pacific RIM Conference on Communications, computers, and Signal Processing-Proceedings, v Ⅱ , 2003,565-568.
5Qi ming,Wen ya-min,The Design And Aplication of Credit CA Certificate, Proceedings of the third international conference on E-commerce engineering, 2003,623-626.
6Zhang chang-you, Zhang li-qun, The Security Policy f Ebusiness Based on PKI,Proceedings of the third international conference on E-commerce engineering, 2003,655-659