^Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157. doi:10.1109/12.729797.
^Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67. doi:10.1109/SECURECOMM.2005.56. ISBN978-0-7695-2369-9. S2CID435025.
^Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. CiteSeerX10.1.1.333.9397. doi:10.1109/5.771065.
^The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 Archived 4 February 2007 at the Wayback Machine