1. Lillian Ablon and Andy Bogart . 2017. Zero days, thousands of nights: The life and times of zero-day vulnerabilities and their exploits . Rand Corporation . Lillian Ablon and Andy Bogart. 2017. Zero days, thousands of nights: The life and times of zero-day vulnerabilities and their exploits. Rand Corporation.
2. Ruba Abu-Salma , Elissa M Redmiles , Blase Ur , and Miranda Wei . 2018 . Exploring User Mental Models of End-to-End Encrypted Communication Tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18) . Ruba Abu-Salma, Elissa M Redmiles, Blase Ur, and Miranda Wei. 2018. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18).
3. Obstacles to the Adoption of Secure Communication Tools
4. Carlisle Adams and Steve Lloyd . 1999. Understanding public-key infrastructure: concepts, standards, and deployment considerations . Sams Publishing . Carlisle Adams and Steve Lloyd. 1999. Understanding public-key infrastructure: concepts, standards, and deployment considerations. Sams Publishing.
5. XPIR : Private Information Retrieval for Everyone