1. PASTA: password-based threshold authentication;Agrawal,2018
2. Prime: byzantine replication under attack;Amir;IEEE Trans. Dependable Secure Comput.,2010
3. Detection and threat prioritization of pivoting attacks in large networks;Apruzzese;IEEE Trans. Emerg. Top. Comput.,2017
4. An XACML-based privacy-centered access control system;Ardagna,2009
5. The methodology of n-version programming;Avizienis;Softw. Fault Toler.,1995