1. Agrawal, R., Evfimiesvski, A., Srikant, R. (2004): Information Sharing Across Private Databases. In: Proc. of the ACM Int. Conf. on Management of Data, SIGMOD03
2. Bellare, M., Canetti, R, Krawczky H. (1996): Message authentication using hash functions – the HMAC construction. In: RSA Labratories' CryptoBytes. Vol 2
3. Beresford, A. R., Stajano, F. (2003): Location privacy in pervasive computing. In: IEEE Pervasive Computing 2: 45–55
4. Diffie, W., Hellman, M. E. (1976): New directions in cryptography. In: IEEE Trans. Inform. Theory IT-22, 22 (6): 664–654
5. Dingledine, R., Mathewson, N., Syverson, P. (2004): Tor: the second-generation onion router. In: Proc. of the 13th USENIX Security Symp