C. Ellison, Ceremony Design and Analysis. Cryptology ePrint Archive, Report, vol.399, 2007.

M. S. Ferdous and A. Jøsang, Entity Authentication and Trust Validation in PKI Using Petname Systems, Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS), pp.302-334, 2013.
DOI : 10.4018/978-1-4666-4030-6.ch013

C. Johansen, A. Jøsang, and D. Migdal, Offpad: Offline personal authenticating device ? implementations and applications, 2016.

A. Jøsang, Trust Extortion on the Internet, 7th Workshop on Security and Trust Management (STM), pp.6-21, 2012.
DOI : 10.1007/978-3-642-29963-6_2

A. Jøsang, B. Alfayyadh, T. Grandison, M. Alzomai, and J. Mcnamara, Security Usability Principles for Vulnerability Analysis and Risk Assessment, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.269-278, 2007.
DOI : 10.1109/ACSAC.2007.14

A. Jøsang, C. Rosenberger, L. Miralabé, H. Klevjer, K. A. Varmedal et al., Local user-centric identity management, Journal of Trust Management, vol.19, issue.4, pp.1-28
DOI : 10.6028/NIST.SP.800-63-2

H. Klevjer, K. A. Varmedal, and A. Jøsang, Extended HTTP Digest Access Authentication, 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN), pp.83-96, 2013.
DOI : 10.1007/978-3-642-37282-7_7

URL : https://hal.archives-ouvertes.fr/hal-01470505

K. A. Varmedal, H. Klevjer, J. Hovlandsvåg, A. Jøsang, J. Vincent et al., The OffPAD: Requirements and Usage, 7th Network and System Security (NSS), 2013.
DOI : 10.1007/978-3-642-38631-2_7

URL : https://hal.archives-ouvertes.fr/hal-01004214