1. Adkins, H.: An update on attempted man-in-the-middle attacks. Technical report, Google Online Security Blog (August 2011),
http://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html
2. Albert, R., Jeong, H., Barabasi, A.-L.: Diameter of the world-wide web. Nature 401, 130–131 (1999)
3. Dolev, S., Gilboa, N., Kopeetsky, M.: Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time. In: Proceedings of the ACM Symposium on Applied Computing, SAC 2010, pp. 1460–1465. ACM, New York (2010)
4. Ellison, C., Schneier, B.: Ten risks of PKI: What you’re not being told about Public Key Infrastructure. Computer Security Journal 16(1), 1–7 (2000),
http://www.counterpane.com/pki-risks.pdf
5. Estrada, E., Hatano, N.: Communicability graph and community structures in complex networks. Applied Mathematics and Computation 214(2), 500–511 (2009)