1. Abelson H, Anderson R, Bellovin SM et al. (1997) The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, 27 May 1997.
2. Abelson H, Anderson R, Bellovin SM et al. (2015) Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications, MIT-CSAIL-TR-2015-026, 6 July 2015.
3. Abelson H, Anderson R, Bellovin SM et al. (2021) Bugs in our Pockets: The Risks of Client-Side Scanning. arXiv:211007450 [cs] 2021.
4. Andersen L, Alisson-Hope D (2022) Human Rights Impact Assessment: Meta’s Expansion of End-to-End Encryption, 4 April 2022.
5. Arnbak AM (2016) Securing Private Communications: Protecting Private Communications Security in EU Law: Fundamental Rights, Functional Value Chains, and Market Incentives. Kluwer Law International, Alphen aan den Rijn, The Netherlands.