1. Goi, B.-M., Phan, R.C.-W., Yang, Y., Bao, F., Deng, R.H., and Siddiqi, M. (2004). International Conference on Applied Cryptography and Network Security, Springer. Lecture Notes in Computer Science.
2. A buyer-seller watermarking protocol;IEEE Trans. Image Process.,2001
3. An efficient and anonymous buyer-seller watermarking protocol;IEEE Trans. Image Process.,2004
4. Furht, B., and Escalante, A. (2010). Handbook of Cloud Computing, Springer.
5. Toward a Smart Cloud: A Review of Fault-tolerance Methods in Cloud Systems;IEEE Trans. Serv. Comput.,2018