[1]
YAN Hai-long, YU Jian-ping, HU Qiang, et al., A Trusted Third Party Inter-Domain Authentication Model Based on Trust Lists. Signal Processing. 2012, 28(9): 1278-1283.
Google Scholar
[2]
SHEN Jie, JANG Cao-hui. A Realization and Implementation of Cross-Certified Based on SOA. Journal of Guizhou University (Natural Science), 2010, 27(1): 80-85.
Google Scholar
[3]
Su Bing, Lv Fang-fang, You Jing, et al., Analysis and research on network trust models based on multi-CA [J]. Second International Conference on Information Technology and Computer Science, 2010: 390-393.
DOI: 10.1109/itcs.2010.101
Google Scholar
[4]
ZHU Peng-fei, DAI Ying-xia, BAO Xu-hua. A distributed trust model with high-compatibility based of bridge CA [J]. Journal of Software, 2006, 17(8): 1818-1823.
DOI: 10.1360/jos171818
Google Scholar
[5]
PENG Hua-Xi. An Identity2Based Authentication Model for Multi2Domain. CHINESE JOURNAL OF COMPU TERS, 2006, 29(8): 1271-1281.
Google Scholar
[6]
Helena Rif-Pous, Jordi Herrera-Joancomarti. An Interdomain PKI Model Based on Trust Lists. EuroPKI 2007, LNCS 4582, 2007: 49-64.
DOI: 10.1007/978-3-540-73408-6_4
Google Scholar
[7]
LIU Yan, XI Jing, LU Jian-de. Proxy of Certificate Validation Based on Hybrid Trust Model. Computer engineering, 2008, 34(1): 170-172.
Google Scholar
[8]
YANG Xuan-yuan, LU Jian-de, LIU Yan. The Research on Cross- certification Based on Path Sear ching Using Weighted Trust List. Microelectronics & Computer, 2006, 23(10): 165-172.
Google Scholar
[9]
ZHOU Jing-quan, ZHANG Shun-yi, LI Ming. A method for authentication using multiple certificate paths. Journal on Communications, 2005, 26(1): 125-129.
Google Scholar
[10]
Li Peng Zhang Changhong Zhou Libing. Research on PKI Trust Model Based on Cross Certification, Computer & Digital Engineering, 2010, 38(12): 100-103.
Google Scholar
[11]
NASH A. Public Key Infrastructure: Implementing and managing electronic security [M]. (2002).
Google Scholar
[12]
Mohan Atreya. Benjamin Hammond. Digital Signatures [M]. US: McGraw-Hill Companies, (2002).
Google Scholar
[13]
Shi Weimin. Researches and Application on PKI and IBE Key Technology [D]. Beijing University of posts and telecommunications Ph.D. Thesis, (2006).
Google Scholar