1. Security evaluation of biometric keys;Al-Assam;Computers & Security,2012
2. Cluster analysis for applications;Anderberg,1973
3. Fair digital signing: the structural reliability of signed documents;Arnellos;Computers & Security,2011
4. Traffic analysis attacks and trade-Offs in anonymity providing systems;Back,2001
5. On integer sequences associated with the cyclic and complete graphs;Barry;Journal of Integer Sequences,2007