1. Security through encryption and security despite encryption - council resolution on encryption (2020). https://data.consilium.europa.eu/doc/document/ST-13084-2020-REV-1/en/pdf. Accessed 20 Sept 2021
2. Lecture Notes in Computer Science;L von Ahn,2006
3. Frankle, J., Park, S., Shaar, D., Goldwasser, S., Weitzner, D.: Practical accountability of secret processes. In: Enck, W., Felt, A.P. (eds.) USENIX Security 2018, pp. 657–674, Baltimore, MD, USA, 15–17 August 2018. USENIX Association (2018)
4. Lecture Notes in Computer Science;S Köpsell,2006
5. Lecture Notes in Computer Science;B Libert,2016