1. Use of internet social networks in academic environment;Cenková;J. Inform. Organ. Sci.,2020
2. Cyber rapid response team: An option within hybrid threats;Galinec,2019
3. On the security of public key protocols;Dolev,1981
4. Inductive analysis of the internet protocol TLS;Paulson;ACM Trans. Inf. Syst. Secur.,1999
5. A logic of authentication;Burrows;ACM Trans. Comput. Syst.,1990