[1] 郭宝安,尹刚,罗世新.商用密码基础设施的现状和发展趋势[J].信息安全与通信保密,2009(8):80-87
[2] Gantt GJ. Hacking health care: authentication securityin the age of meaningful use[J]. Journal of Law and Health, 2014(4): 232-258
[3] 王长喜.商用密码回顾与展望[J].信息网络安全,2010(1):5-7
[4] 陈欣新.美俄商用密码法律监管制度比较[J].北方法学,2011(1):44-51
[5] India Department of Electronics and Information Technology. Draft National Encryption Policy[EB/OL]. [2016-3-20]. https://publicintelligence.net/india-draft-encryption-policy
[6] Vagle JL. Furtive encryption: power, trust, and the constitutional cost of collective surveillance[J]. Indiana Law Journal, 2015(12): 102-135
[7] Terzian D. Forced Decryption as a Foregone Conclusion[J]. California Law Review Circuit, 2015(5): 26-36
[8] Cate FH. Government data mining: the need for a legal framework[J]. Harvard Civil Rights-Civil Liberties Law Review, 2008(Summer), 43: 435-490
[9] 袁科.俄罗斯密码服务体系研究[D].贵阳:贵州大学,2009
[10 崔聪聪,李欲晓,韩松.《网络安全法(草案二次审议稿)》第27条修改建议——以网络服务提供者协助解密义务为中心[J].中国工程科学,2016(12):34-38
[11] 黄平.捍卫信息安全,共谋商用密码管理工作新作为[J].信息安全与通信保密,2015(6):88-89