1. A modular approach to key safeguarding
2. Attasena, V., Harbi, N., & Darmont, J. (2013) Sharing-based Privacy and Availability of Cloud Data Warehouses. 9th French-speaking days on Data Warehouse and On-line Analysis (EDA 2013), Blois, France: RNTI, B-9.17-32.
3. Incremental Cryptography: The Case of Hashing and Signing. Advances in Cryptology (CRYPTO’94);M.Bellare;LNCS,1994
4. Safeguarding Cryptographic Keys.;G. R.Blakley;1979 AFIPS National Computer Conference, Monval, NJ, USA.,1979
5. Proofs of Retrievability: Theory and Implementation.;K. D.Bowers;1st ACM Workshop on Cloud Computing Security (CCSW’09),2009