1. Security-control methods for statistical databases;Adam;ACM Computing Surveys,1989
2. Fast Implementations of AES Candidates;Aoki,2000
3. Information act opens data and debate;Azar;American Psychological Association Monitor,1999
4. Generalized secret sharing and monotone functions;Benaloh,1988
5. Securing XML documents with Author-X;Bertino;IEEE Internet Computing,2001