1. Backes M, Cachin C, Oprea A. Lazy revocation in cryptographic file systems. In: Third international IEEE security in storage workshop (SISW 2005); December 13, 2005. San Francisco, California, USA; 2005. p. 1–11.
2. Backes M, Cachin C, Oprea A. Secure key-updating for lazy revocation. In: Computer security—ESORICS 2006. Proceedings of the 11th European symposium on research in computer security. Hamburg, Germany, September 18–20; 2006. Lecture notes in computer science, vol. 4189. Springer; 2006, p. 327–46.
3. Berliner, Polk. Concurrent versions system (cvs). 〈http://www.cvshome.org/ 〉; 2001.
4. A hierarchical extraction policy for content extraction signatures;Bull;International Journal on Digital Libraries,2004
5. Catuogno L, Manulis M, Löhr H, Sadeghi A-R, Winandy M. Transparent mobile storage protection in trusted virtual domains. In: 23rd large installation system administration conference (LISA'09). USENIX Association; 2009.