1. Allison B. Lewko, Brent Waters: Decentralizing Attribute-Based Encryption. EUROCRYPT 2011: 568–588.
2. Anadiotis A. C., Castro H., Charalampos P., Chiariglione L., Corlan L., Detti A., Gkonis P., Huebner T., Melazzi N. B., Mousas A., Ribas J., Salsano S., Sequeira D., Tanase M., Tropea G. (2011). Report: System Architecture. Convergence (D3.3).
3. Benoît Libert, Damien Vergnaud: Group Signatures with Verifier-Local Revo-cation and Backward Unlinkability in the Standard Model. CANS 2009: 498–517.
4. Carlisle Adams, Steve Lloyd, (1999): Understanding the public –key infrastructure. [cited 2013 May 15].
5. Crowd sourced. Phishing OAuth 2 [cited 2012 Nov 22]. Available online at:
http://en.wikipedia.org/wiki/Phishing
.