1. Chaum, D. (1985) Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28 /10 (1985), 1030–1044.
2. Hetschold, T. (1993) Aufbewahrbarkeit von Erreichbarkeits-und Schlüsselinformation im Gewahrsam des Endbenutzers unter Erhaltung der GSM-Funktionalität eines Funknetzes. GMD-Studien Nr. 222, Oktober 1993.
3. Kesdogan, D.; Federrath, H.; Jerichow, A. and Pfitzmann, A. (1996) Location Management Strategies increasing Privacy in Mobile Communication Systems; in Information Systems Security. Facing the information society of the 21st century. Proc. IFIP/SEC ‘86–12th International Information Security Conference 21–24 May 1996, Island of Samos, Greece, Chapman and Hall, 1996.
4. Kumbruck, C. and Schneider, M.J. (1995) Simulation Studies, a new method of prospective Technology Assessment and Design; Working Paper, No. 190, provet, Darmstadt, September 1995.
5. Müller, G. and Stoll, F. (1995) The Freiburg Communications Assistant Enabling Decentralization and Privacy in Mobile Communications Systems. Speaker’s Papers, 7th World Telecommunication Forum, Technology Summit “Convergence of technologies, services and applications” Vol. 1, ITU Telecom 95 Technical Forum, Geneva, 3–11 October 1995, International Telecommunication Union, October 1995, 245–249.