1. Chomsky, N.: Syntactic Structures. Mouton, London (1957)
2. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)
3. Laudon, K.C., Laudon, J.P.: Management Information Systems – Managing the Digital Firm (7th ed.), Prentice-Hall International Inc. (2002)
4. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
5. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (Eds.), Complex, Intelligent, and Software Intensive Systems, Advances in Intelligent Systems and Computing, 611, 82–93. Springer, Cham (2018)