1. Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P., & Wright, R. N. (2018). From Keys to Databases—Real-World Applications of Secure Multi-Party Computation. The Computer Journal, 61, 1749–1771.
2. Bermúdez, J. (2016). A Practical Multi-party Computation Algorithm for a Secure Distributed Online Voting System. ArXiv, abs/1603.04228.
3. Cramer, R., Damgard, I., & Nielsen, J. (2015). Secure Multiparty Computation and Secret Sharing. Cambridge University Press.
4. Dagnino, G., & Padula, G. (2002). Coopetition Strategy: Towards a New Kind of Interfirm Dynamics for Value Creation. EURAM 2nd Annual Conference, Stockholm School of Entrepreneurship, Sweden.
5. Goldreich, O., Micali, S., & Wigderson, A. (1987). How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. STOC, 1987, 218–229.