1. Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. Cryptology ePrint Archive, Report 2011/096 (2011),
http://eprint.iacr.org/
2. Lecture Notes in Computer Science;G. Ateniese,2005
3. Lecture Notes in Computer Science;D. Boneh,2003
4. Lecture Notes in Computer Science;C. Brzuska,2010
5. Lecture Notes in Computer Science;C. Brzuska,2009