1. Arkin, B., Hill, F., Marks, S., Scjmod, M., & Walls, T. (1999). How we learned to cheat at on-line poker: A study in software security. Available at http://www.developer.com/java/other/article.php/10936_616221
2. Practical byzantine fault tolerance and proactive recovery
3. Threshold cryptosystems
4. Intrusion tolerance in distributed computing systems.;Y.Deswarte;Proceedings of the IEEE Symposium on Research in Security and Privacy,1991
5. Enforcing semantic integrity on untrusted clients in networked virtual environments.;S.Jha;Proceedings of the IEEE Symposium on Security and Privacy,2007