Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In
Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Tikk, Eneken. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia : Cooperative Cyber Defense Center of Excellence, 2008.
Cyber Security Strategy 2008. Ministry of Defence, 2008.
Tagarev, Todor. Defence Programmes as a Language for Effective Communication In
IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
The Defense Strategy of Montenegro. Official Gazette of Montenegro, no. 79/08, 2008.
Tagarev, Todor. Democratic governance of the security sector: Defence Policy In
IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Chang, Ming-Hsin, I-Te Chen, and Ming-Te Chen. "
Design of Proxy Signature in ECDSA." In
Eighth International Conference on Intelligent Systems Design and Applications. Kaohsiung, Taiwan , 2008.
Hnaity, Omar Al. Design Secure E-voting Scheme In
Department Of Computer Science, Faculty of information technology. Vol. Master in Computer Science. Amman Jordan: Middle East University, 2008.