1. Cryptomathic white paper on: key management compliance-explained. Available from: www.cryptomathic.com/whitepapers/Keymanagementcompliance.
2. Cheng Z Comley R. Attacks On An ISO/IEC 11770-2 key establishment protocol.
3. ISO. Information technology-security techniques-key management-part 2: Mechanisms using symmetric techniques. 1996. ISO/IEC 11770–2.
4. International Organization for Standardization. Geneva:Switzerland. ISO/IEC 11770-2:2018. Information technology Security techniques – Key Management Part 2: Mechanisms using Symmetric Techniques;Edition-3.
5. Benet J. IPFS- Content Addressed Versioned P2P File System. arXiv preprint arXiv:1407.3561. 2014.