1. Chang, S., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. NISTIR 7896, National Institute for Standards and Technology (November 2012)
2. Lecture Notes in Computer Science;M. Stevens,2009
3. Duong, T., Rizzo, J.: Flickr’s API Signature Forgery Vulnerability (September 2009),
http://netifera.com/research/
4. Slipetskyy, R.: Security issues in OpenStack. Master’s thesis, Norwegian University of Science and Technology (2011)
5. Pollack, D.: HSS: A simple file storage system for web applications. In: 26th Large Installation System Administration Conference, LISA 2012 (2012)