1. Allman, M.: What ought a program committee to do? In: Proceedings of the Conference on Organizing Workshops, Conferences, and Symposia for Computer Systems, pp. 9:1–9:5. USENIX Association, Berkeley (2008)
2. Burstein, A.J.: Conducting cybersecurity research legally and ethically. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 8:1–8:8. USENIX Association, Berkeley (2008)
3. Lecture Notes in Computer Science;C. Castelluccia,2010
4. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004)
5. Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. In: (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)