1. Abul O, Bonchi F, Nanni M (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. In: IEEE 24th international conference on data engineering, ICDE 2008, pp 376 –385
2. Andrienko G, Andrienko N, Giannotti F, Monreale A, Pedreschi D (2009) Movement data anonymity through generalization. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 international workshop on security and privacy in GIS and LBS, SPRINGL ’09, pp 27–31
3. Anwar Z, Shankesi R, Campbell R (2008) Automatic security assessment of critical cyber-infrastructures. In: Proceedings of 2008 IEEE international conference on dependable systems and networks with FTCS and DCC, 2008. DSN 2008, pp 366 –375
4. Aranha D, López J, Hankerson D (2010) High-speed parallel software implementation of the η T pairing. In: Topics in cryptology—CT-RSA 2010, LNCS, vol 5985, Springer, Berlin, pp 89–105
5. Armando A, Carbone R, Compagna L, Cuellar J, Tobarra L (2008) Formal analysis of saml 2.0 web browser single sign-on: breaking the saml-based single sign-on for google apps. In: Proceedings of the 6th ACM workshop on formal methods in security engineering, FMSE ’08, pp 1–10