1. URL: Microsoft warning over browser security flaw (2011),
http://www.bbc.co.uk/news/technology-12325139
2. Ellison, C.: Ceremony design and analysis. Technical report, Cryptology ePrint Archive, Report 2007/739 (2007)
3. Pieters, W.: Representing Humans in System Security Models: An Actor-Network Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2, 75–92 (2011)
4. Martina, J.E., de Souza, T.C.S., Custódio, R.F.: Ceremonies design for PKI’s hardware security modules. In: Proc. of the 9th Brazilian Symposium on Information and Computer System Security (NDSS 2009), pp. 115–128. SBC Press (2009)
5. Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proc. of the 16th Network and Distributed System Security Symposium (NDSS 2009) (2009)