1. Browser security handbook,
http://code.google.com/p/browsersec
2. How secure is Dropbox?,
https://www.dropbox.com/help/27/en
3. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. SIGPLAN Not. 36, 104–115 (2001)
4. Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335–348 (2008)
5. Adida, B., Barth, A., Jackson, C.: Rootkits for JavaScript environments. In: Workshop on Offensive Technologies, WOOT (2009)