Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar (19 грудня 2012), Efficient spatial privacy preserving scheme for sensor network, Central European Journal of Engineering, 3 (1): 1—10, doi:10.2478/s13531-012-0048-7
E. Bresson; J. Stern; M. Szydlo (2002), Threshold ring signatures and applications to ad-hocgroups, Advances in Cryptology: Crypto 2002: 465—480, doi:10.1007/3-540-45708-9_30
Liu, Joseph K.; Wong, Duncan S. (2005), Linkable ring signatures: Security models and new schemes, ICCSA, 2: 614—623, doi:10.1007/11424826_65
Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Yuen, Tsz Hon (2006), Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature, Lecture Notes in Computer Science, 4329: 364—378, doi:10.1007/11941378_26
dx.doi.org
Lingling Wang, Guoyin Zhang, Chunguang Ma. A survey of ring signature // Frontiers of Electrical and Electronic Engineering in China. — 2008. — Vol. 3, no. 1. — P. 10–19. — DOI:10.1007/s11460-008-0012-8.