1. How to leak a Secret;R Rivest;Lecture Notes in Computer Science,2001
2. Efficient spatial privacy preserving scheme for sensor network;A Debnath;Central European Journal of Engineering,2012
3. A comparative analysis of SHA and MD5 algorithm;P Gupta;International Journal of Computer Science and Information Technologies,2014
4. Group signatures;D Chaum;Advances in Cryptology -Eurocrypt '91,1991
5. New Identity-Based Ring Signature Schemes;J Herranz;Information and Communications Security, 6th International Conference,2004