B. Adida, A. Barth, C. J. Akhawe, A. Barth, P. E. Lam et al., Rootkits for JavaScript environments Towards a formal foundation of web security, Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2009.

C. Bansal, K. Bhargavan, and S. Maffeis, Discovering Concrete Attacks on Website Authorization by Formal Analysis, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.27

URL : https://hal.archives-ouvertes.fr/hal-00815834

A. Barth, C. Jackson, and J. C. Mitchell, Robust defenses for cross-site request forgery, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.75-88, 2008.
DOI : 10.1145/1455770.1455782

A. Belenko and D. Sklyarov, Secure Password Managers " and " Military-Grade Encryption " on Smartphones: Oh, Really?

M. Steven and . Bellovin, Cryptography and the internet, Advances in Cryptology: Proceedings of CRYPTO '98, 1998.

D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer, Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006.
DOI : 10.1109/SRDS.2006.15

S. Kamara and K. Lauter, Cryptographic Cloud Storage, Proceedings of the 14th international conference on Financial cryptograpy and data security, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

J. Kelsey, B. Schneier, C. Hall, and D. Wagner, Secure applications of low-entropy keys, Proceedings of the First International Workshop on Information Security, ISW '97, pp.121-134, 1998.
DOI : 10.1007/BFb0030415

P. Rogaway, Authenticated-encryption with associated-data, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.98-107, 2002.
DOI : 10.1145/586110.586125

G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson, Busting frame busting: a study of clickjacking vulnerabilities at popular sites, IEEE Oakland Web 2.0 Security and Privacy, 2010.