1. G. Kuper, F. Massacci, N. Rassadko, Generalized XML security views, in Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (2005), pp 77–84
2. H. Oh, L. Jalali, R. Jain, An intelligent notification system using context from real-time personal activity monitoring, in IEEE International Conference on Multimedia and Expo, vol. 1 (2015), pp. 1–6
3. M. Saudi, N.J. Zaizi, K.J. Sweese, A.A. Bakar, Spatial Signature Method (SSM) Against XML signature wrapping attacks, in MATEC Web of Conferences, vol. 255 (2019), pp. 2016
4. D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Annual International Cryptology Conference (Springer, Berlin, 2004), pp. 41–55
5. J. Camenisch, Efficient and generalized group signatures, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, 1997), pp. 465–479