1. J.H. Saltzer, D. P. Reed and D.D. Clark, "Review for Paper: End to End Arguments in System Design" Polytechnic University, USA, 2006.
2. K. S. M. Moe, T. Win, "Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack" in 15th Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI) Conference, Thailand, Chaing Rai, 2018.
3. A. Juels and T. Ristenpart, "Honey encryption: security beyond the brute-force bound," in Advances in Cryptology EUROCRYPT 2014, Springer, Berlin, Germany, 2014, vol. 8441 of Lecture Notes in Computer Science, pp. 293-310.
4. N.Tyagi, J. Wang, K. Wen and D. Zuo, Honey Encryption Application, Computer and network Security, Springer, 2015.
5. D. Gross, "50 million compromised in Evernote hack" CNN, 4 March 2013.