1R.Gennaro,S.Jarechi,H.Krawczyk,and T.Rabin.Robust Threshold DSS Signatures.U.M.Maurer.Advances in Cryptology-Eurocrypt'96.1996.Lecture Notes in Computer Science 1070, Springer- Verlag, 1996: 354- 371.
2A.Shamir. How to Share a Secret. Commun. ACM. 1979, 24 (11): 612-613.
3Mambo M., Usuda K., and Okamoto E.Proxy signatures:Delegation of the power to sign messages[J].IEICE Trans. Fundam, 1996, E79 - A (9) : 1338 - 1354.
4张伟龙.在线手写签名认证融合算法的研究[D].武汉理工大学2009
5Alisher Kholmatov,Berrin Yanikoglu.SUSIG: an on-line signature database, associated protocols and benchmark results[J]. Pattern Analysis and Applications . 2009 (3)
6Anil K. Jain,Friederike D. Griess,Scott D. Connell.On-line signature verification[J]. Pattern Recognition . 2002 (12)
7Argones Rúa, Enrique,Alba Castro, José Luis.Online signature verification based on generative models. IEEE Transactions on Systems Man and Cybernetics . 2012
8Plamondon R,Lorette G.Automatic signature verification and writer identification-the state of the art. Pattern Recognition . 1989
9Shohel Sayeed,Nidal S. Kamel,Rosli Besar.A Novel Approach to Dynamic Signature Verification Using Sensor-Based Data glove. American Journal of Applied Sciences . 2009
10Mario E. Munich,Pietro Perona.Visual Identification by Signature Tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence . 2003