1. Khandelwal S.: ‘Millions of IoT devices using same hard‐coded CRYPTO keys’ 2015. Available athttp://thehackernews.com
2. Chadha A. Liu Y. Das S.K.: ‘Group key distribution via local collaboration in wireless sensor networks’.IEEE SECON Proc. Santa Clara CA USA 2005
3. Geambasu R. Kohno T. Levy A.A. et al.: ‘Vanish: increasing data privacy with self‐destructing data’.USENIX Security Symp. Montreal Canada 2009
4. http://go.thalesesecurity.com/rs/480‐LWA‐970/images/Microsoft‐AD‐CS‐and‐OCSP‐Integration‐Guide‐for‐Microsoft‐Windows‐Server‐2016.pdf accessed May 2017
5. Able J. et al.: ‘DNSSEC root zone high level technical architecture’ 2010. Available athttp://www.rootdnssec.org/wp‐content/uploads/2010/06/draft‐icanndnssec‐arch‐v1dot4.pdf