1. Aumann, Y., Rabin, M.O.: Efficient Deniable Authentication of Long Messages. In: Int. Conf. on Theoretical Computer Science in Honour of Professor Manuel Blum’s 60th Birthday (1998),
http://www.cs.cityu.edu.hk/dept/video.html
2. Boyd, C., Mao, W., Paterson, K.G.: Deniable authenticated key establishment for Internet protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) (April 2003)
3. Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proc. 30th ACM STOC 1998, Dallas TX, USA, pp. 409–418 (1998)
4. Chou, J.S., Chen, Y.L., Huang, J.C.: A ID-Based Deniable Authentication Protocol on pairings. Cryptology ePrint Archive: Report (335) (2006)
5. Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. Cryptology ePrint Archive: Report (451) (2005)