1. Abul O, Bonchi F, Nanni M (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. ICDE ’08. IEEE Computer Society, Washington, DC, USA
2. Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic databases. In: Proceedings of the 28th international conference on Very Large Data Bases. VLDB Endowment, pp 143–154
3. Anderson R (2010) Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley
4. Bertoni G, Daemen J, Peeters M, Assche G (2013) Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. In: Proceedings, chap. Keccak Athens, Greece, May 26-30, 2013. Springer, Berlin, Heidelberg, pp 313–314
5. Dierks T, Rescorla E (2008) The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard). (Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685) http://www.ietf.org/rfc/rfc5246.txt