1W Diffie, M E Hellman. New Directions in Cryptography [ J ]. IEEE Transaction on Information Theory, 1976 IT-22,(6):644-654.
2NIST: Public Key Infrastructure Study[ M]. Gaithersburg, MD, April 1994.
3Russell Housley, Warwick Ford, et al. Internet X. 509 Public Key Infrastructure Certificate and CRL Profile[ S]. RFC2459. PKIX Working Group, 1999.
4Michael Myers, Rich Ankney, Ambarish Malpanl. X. 509 Internet Public Key Infrastructure Online Certificate Status Protocol (OCSP)[ S]. RFC2560. PKIX ,2000.
5Castro J, C forne J. A Model to Evaluate Certificate Revocation [ C ].4th World Multiconference on Systemics, Cybernetics and Informatics ,2000.
6Ronald L Rivest. Can We Eliminate Certificate Revocation Lists[ C].In Rafael Hirschfeld, Financial Cryptography FC98, Anguilla, British Ewst Indies, 1998. 1465. 178-183.
7Naor M, Nissim K. Certificate Revocation and Certificate Update[ C]. Department of Applied Mathematics and Computer Science,7th USENIX Security Symposium, 1998.
8BERKOVITS S, CHOKANI S, GEITER A, et al. Public key infrastructure study: final report[EB/OL]. MITRE corporation for NIST, bttp://csrc.nist.gov/pki/documents/mitre.ps, 1994.
9HOUSLEY R, FORD W, POLK W, et al. Internet X.509 public key infrastructure certificate and CRL profile[EB/OL]. Internet Draft,http://www. ietf. org/rfc/rfc2459.txt, 1999.
10MICALI S. Efficient certificate revocation[EB/OL]. Technical Memo MIT/LCS/TM-542b, Massachusetts Institute of Technology, ftp://ftp.lcs.mit.edu/pub/lcs-pubs/tm.outbox/MIT-LCS -TM-542b.ps.gz, 1996.