1. Evaluation of format-preserving encryption algorithms for critical infrastructure protection;Agbeyibor,2014
2. Information sharing and collaboration policies within government agencies;Atabakhsh,2004
3. Preserving privacy and efficiency in data communication and aggregation for AMI network;Bae;J Network Comp App,2016
4. Standardizing cyber threat intelligence information with the structured threat information expression (STIX);Barnum,2014
5. Format-preserving encryption;Bellare,2009