N. Wagner, and M. Magyarik. Advances in Cryptology: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, page 19--36. Springer, (1985)
H. Vogt. Proceedings of ESAS 2004 (1st European Workshop on Security in Ad
Hoc and Sensor Networks), Heidelberg, Germany, Springer-Verlag, (August 2004)
W. Tzeng. Third International Workshop on Practice and Theory in Public Key
Cryptosystems, PKC 2000, volume 1751 of Lecture Notes in Computer Science, page 1--13. Springer, (2000)
L. Torvalds. Proceedings of the AUUG94 Conference: Open systems. Looking into
the future: 6--9 September 1994, World Congress Centre, Melbourne,
Australia, page 9--14. Kensington, NSW, Australia, AUUG Inc, (1994)
Q. Tang, and C. Mitchell. Computational Intelligence and Security, CIS 2005 (2), volume 3802 of Lecture Notes in Computer Science, page 149-154. Springer, (2005)
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Proceedings of Designing Privacy Enhancing Technologies: Workshop
on Design Issues in Anonymity and Unobservability, page 96--114. Springer-Verlag, LNCS 2009, (July 2000)
J. Stern, D. Pointcheval, J. Malone-Lee, and N. Smart. Advances in Cryptology -- CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, page 93--110. Springer, (2002)