1. IFIP AICT;S. Berthold,2009
2. Lecture Notes in Computer Science;J.L. Camenisch,2001
3. Chen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010),
http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
4. Clarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. IEEE Internet Computing 6(1), 40–49 (2002)
5. Danezis, G., Clayton, R.: Introducing traffic analysis. In: Attacks, Defences and Public Policy Issues. CRC Press (2007)