1. Article 8: The right to respect for private and family life, home and correspondence, Available at: http://www.equalityhumanrights.com/sites/default/files/documents/humanrights/hrr_article_8.pdf
2. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–88, 1981.
3. Andreas Pfitzmann. Multilateral security: Enabling technologies and their evaluation. In Reinhard Wilhelm, editor, Informatics – 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 50–62. Springer, 2001.
4. Martin Rost and Andreas Pfitzmann. Datenschutz-Schutzziele – revisited. Datenschutz und Datensicherheit (DuD), 33(6):353–358, June 2009.
5. Gabrielle Demange, Myrna Wooders ‘Group formation in economics: networks, clubs and coalitions’ Cambridge University Press, 2005
6. Biskup, J. Security in Computing Systems: Challenges, Approaches and Solutions, Ed. Spring-Verlag Berlin Heidelberg, 2009, pp. 6
7. Dean, T. Network+ Guide to Networks, 5th Edition, Ed. Course Technology, 2010, pp. 2-10
8. PricewaterhouseCoopers, A Practical Guide to Risk Assessment (2008), 3.