1. Lecture Notes in Computer Science;D. Basin,2010
2. LNBIP;M. Busch,2011
3. Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 75–88. ACM, New York (2008)
4. NESSoS: Network of Excellence on Engineering Secure Future Internet Software Services and Systems (2014),
http://nessos-project.eu/
5. LNCS;A. Bertolino,2014