1. Perrig A., Canetti R., Tygar, J.D., Song, S.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Security and Privacy Symposium (2000)
2. Mujaj. A.: A comparison of secure messaging protocols and implementations. Master’s thesis, Department of Informatics at the Faculty of Mathematics and Natural Sciences of the University of Oslo (2017)
3. Diffie, W., Hellman, M.: New directions in cryptography. In: IEEE Transactions on Information Theory, pp. 74–84 (1977)
4. Bruce, S.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company (2015). ISBN-13: 978-0393352177
5. Johansen, C., Mujaj, A., Arshad, H., Noll, J.: Comparing implementations of secure messaging protocols (long version). Technical Report 475, Department of Informatics, University of Oslo, Nov 2017