1. S. Adler, “The Slashdot effect: an analysis of three Internet publications,” Linux Gazette issue 38, March 1999.
2. R. Albert, H. Jeong, and A. Barabási, “Error and attack tolerance of complex networks,” Nature
406, 378–382 (2000).
3. American National Standards Institute, American National Standard X9.30.2-1997: Public Key Cryptography for the Financial Services Industry-Part 2: The Secure Hash Algorithm (SHA-1) (1997).
4. R. J. Anderson, “The Eternity service,” in Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT’ 96), Prague, Czech Republic (1996).
5. O. Berthold, H. Federrath, and S. Köpsell, “Web MIXes: a system for anonymous and unobservable Internet access,” in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York (2001).