[1 . Santos, N., K. P. Gummadi, R. Rodrigues. Towards Trusted Cloud Computing. - In: USENIX HotCloud, 2009.]Search in Google Scholar
[2. Agrawal, Rakesh, Ramakrishnan Srikant. Privacy-Preserving Data Mining. - In: Proc. of ACM Management of Data (SIGMOD), 2000, pp. 439-450.10.1145/335191.335438]Search in Google Scholar
[3. Aggarwal, C. C. On k-Anonymity and the Curse of Dimensionality. - In: VLDB, 2005, pp. 901-909.]Search in Google Scholar
[4. Casassa - Mont, M., S. Pearson, P. Bramhall. Towards Accountable Management of Ldentity and Privacy: Sticky Policies and Enforceable Tracing Services. - In: Proc. DEXA’2003, 2003, pp. 377-382.]Search in Google Scholar
[5. Rivest, R.L., A. Shamir, L. Adleman. A Method for Obtaining Digital. Signatures and Public-Key Cryptosystems. The Technical Paper to Laboratory for Computer Science, Massachuset Institute of Tech,Cambridge.]Search in Google Scholar
[6. Hao, Yong, Yu Cheng, Kui Ren, Distributed Key Management with Protection against RSU Compromise in Group Signature Based VANETs. 3rd Ed. Vol. 2. IEEE BLOBECOM 2008.10.1109/GLOCOM.2008.ECP.947]Search in Google Scholar
[7. Kaliski, Burt. The Mathematics of the RSA Public-Key Cryptosystem. - In: RSA Laboratories. P. Kitsos, N. Sklavos and O. Koufopavlou, Eds. An Efficient Implementation of the Digital Signature Algorithm, IEEE, 2008.]Search in Google Scholar
[8. Diffe, W., M. Hellman. New Directions in Cryptography. - IEEE Trans. Inform. Theory IT-22, November 1976, pp. 644-654.10.1109/TIT.1976.1055638]Search in Google Scholar
[9. Liu, G. M. Very Simple Schemes for Group Signatures. Master Thesis, Chung Yuan Christian University, June 2003.]Search in Google Scholar
[10. Chaum, D., E. van Heyst. Group Signatures. - In: Andances in Cryptology EUROCRYPT’91, Vol. 547, 1991, pp. 257-265.10.1007/3-540-46416-6_22]Search in Google Scholar