M. Beck, J. Spoerhase, and S. Storandt. Proc. 9th International Conference on Algorithms and Discrete Applied Mathematics (CALDAM'23), 13947, page 321--334. (2023)
A. Mladenow, C. Bauer, C. Strauss, and M. Gregus. 7th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2015), page 1-6. IEEE, (2015)
R. Baker, and I. Martinovic. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, page 35--46. New York, NY, USA, ACM, (2016)
S. Chandra, L. Khan, and F. Muhaya. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, page 838-843. (October 2011)
B. Hecht, L. Hong, B. Suh, and E. Chi. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, page 237--246. New York, NY, USA, ACM, (2011)
A. Hang, A. Luca, M. Smith, M. Richter, and H. Hussmann. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), page 169-183. Ottawa, USENIX Association, (July 2015)
S. Brands, and D. Chaum. Advances in Cryptology, volume 765 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, EUROCRYPT edition, (1994)
P. Patil, S. Sangle, A. Yenare, and R. Sonawane. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (3):
1357--1360(March 2015)
S. Kinsella, V. Murdock, and N. O'Hare. Proceedings of the 3rd International Workshop on Search and Mining User-generated Contents, page 61--68. New York, NY, USA, ACM, (2011)