1. Abelson, H., et al.: Keys under doormats. Commun. ACM 58(10), 24–26 (2015)
2. Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 15, pp. 364–375. ACM Press, October 2015
3. Lecture Notes in Computer Science;M Bellare,2015
4. Lecture Notes in Computer Science;M Bellare,2013
5. Bellare, M., Jaeger, J., Kane, D.: Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 15, pp. 1431–1440. ACM Press, October 2015