6

Software Implementation

Full book at https://www.crcpress.com/Guide-to-Pairing-Based-Cryptography/El-Mrabet-Joye/p/book/9781498729505

Software vulnerabilities in the Brazilian voting machine

Full book at http://www.igi-global.com/book/design-development-use-secure-electronic/94868

On the Identity-Based Encryption for WM² Nets

Full book at http://www.mhprofessional.com/product.php?isbn=0071482563