1. Matt, B., Introduction to Computer Security. Addison-Wesley Professional (2004)
2. Sadeghi, A., Steiner, M.: Assumptions related to discrete logarithms: why subtleties make a real difference. In: Advances in Cryptology Eurocrypt 2001, LNCS 2045. Springer, Berlin, pp. 243–260 (2001)
3. Drevin, L., Kruger, H., Steyn, T.: Determinants of password security: some educational aspects, information assurance and security education and training. IFIP Adv. Inf. Commun. Technol. 406, 241–248 (2013)
4. Provos, N., David, M.: A future-adaptable password scheme. In: USENIX Annual Technical Conference, FREENIX Track, USENIX, pp. 81–91 (1999)
5. Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulted public-key cryptosystems. In: Advances in Cryptology-Eurpcrypt 2002, LNCS 2332, pp. 65–82, Springer, Berlin (2002)