1. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions – the HMAC construction. RSA Laboratories, CryptoBytes 2, 15 (1996)
2. Borst, F., Allaert, F.A., Quantin, C.: The Swiss Solution for Anonymous Chaining Patient Files. In: MEDINFO 2001 (2001)
3. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT22(6), 644–654 (1976)
4. Fellegi, I., Sunter, A.: A Theory for Record Linkage. Journal of the American Statistical Society (1969)
5. Kelman, C.W., Bass, A.J., Holman, C.D.J.: Research use of linked health data – A best practice protocol. ANZ Journal of Public Health 26, 3 (2002)