Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies. FIDO Alliance White Paper, https://fidoalliance.org, 2017
E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms," In Privacy-Preserving Data Mining: Models and Algorithms, vol.34, pp.183-205, Kluwer Academic Publishers, Jun. 2008.
M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. Selected Areas in Cryptography - SAC 2009. Lecture Notes in Comput. Sci., vol. 5867, pp. 295-312, 2009
D. Sacharidis, K. Mouratidis and D. Papadias, "k-Anonymity in the Presence of External Databases," IEEE Transactions on Knowledge and Data Engineering, 2010.
K. Veeramachaneni, I. Arnaldo AI2: training a big data machine to defend IEEE international conference on big data security on Cloud (BigDataSecurity 2016) (2016)
Meng Zhang, Anand Raghunathan, and Niraj K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection, IEEE Transactions on Biomedical Circuits and Systems
Stan Higgins (July 21, 2015). "Inside R3CEV's Plot to Bring Distributed Ledgers to Wall Street“
KOTRA, 워싱턴무역관, "미국 사이버보안시장 동향과 우리기업 진출을 위한 시사점", 2016.8