1. Cryptography and Network Security, Principles and Practices;Stallings,2003
2. Applied Cryptography;Schneier,1996
3. Addressing cloud computing security issues;Zissis;Future Generation Computer Systems,2012
4. Authentication, from Passwords to Public Keys;Smith,2002
5. Key management in a non-trusted distributed environment;Dawson;Future Generation Computer Systems,2000