Amoroso E. 1994, Fundamentals of Computer Security Technology, Prentice Hall
International Editions Diffie W., Hellman M.E., Multiuser cryptography, National Computer Conference, New Zork,
1976 D. Hellman, W. Diffie, Multiuser
cryptography, National Computer Conference New York, 1976 R.L. Rivest, A. Shamir, L. Adleman, On
digital signatures and public-key functions, Comm. Os ACM, 1976 R.L. Rivest, A. Shamir, L. Adleman, A
description of a Single-Chipimplementation of RSA cipher, LAMBDA Magazine
1, 1980 Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (1990) Introduction to Algorithms, MIT Press, Cambridge MA and McGraw-Hill, New York. Donald Knuth, The Art of Computer Programming, Volume 3: Sorting and Searching, Addison-Wesley, 1973. https://builtin.com/blockchain/blockchain-cybersecurity-uses https://www.cm-alliance.com/cybersecurity-blog/the-future-use-cases-of-blockchain-for-cybersecurity https://www.apriorit.com/dev-blog/462-blockchain-cybersecurity-pros-cons https://www.intechopen.com/books/computer-security-threats/blockchain-applications-in-cybersecurity https://guggero.github.io/blockchain-demo/#!/