1. The Burglary: the discovery of J. Edgar Hoover’s Secret FBI;Medsger,2014
2. Schneier B. 1971 Social engineering attack. .
3. Whitworth B, Ahmad A. The social design of technical systems: building technologies for communities. The interaction design foundation; 2013. .
4. Security protocols, properties, and their monitoring;Bauer,2008
5. Operational semantics and verification of security protocols, information security and cryptography;Cremers,2012