1. Recommendation for Key Management;Barker,2020
2. Ratcheted encryption and key exchange: the security of messaging;Bellare,2017
3. Forward Integrity for Secure Audit Logs;Bellare,1997
4. Restfs: secure data deletion using reliable & efficient stackable file system;Bhat,2012
5. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes;Bonneau,2012