References
- Rosén M, Guldgruvan i ha¨lso- och sjukvården - Översyn av de svenska kvalitesregistren. Stockholm: Sveriges Kommuner och Landsting; 2010. Available from: https://webbutik.skl.se/bilder/artiklar/pdf/7164-613-2.pdf (accessed 24 August 2018).
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation); 2016. Available from: https://publications.europa.eu/en/publication-detail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1/language-en (accessed 24 August 2018).
- European Data Protection Supervisor. Guidelines on the protection of personal data in IT governance and IT management of EU institutions. Available from: https://edps.europa.eu/sites/edp/files/publication/it_governance_management_en.pdf (accessed 24 August 2018).
- Ferguson N, Schneider B, Kohno T, Cryptography engineering: design principles and practical applications. Hoboken, NJ: Wiley; 2010.
- Menezes AJ, van Oorschot PC, Vanstone Scott A, Handbook of applied cryptography, 5th printing. Boca Raton, FL: Taylor & Francis; 1997. Available at: http://www.cacr.math.uwaterloo.ca/hac/.
- Wikipedia. Books on cryptography. Available from: https://en.wikipedia.org/wiki/Books_on_cryptography (accessed 24 August 2018).
- Wikipedia. Strong cryptography. Available from: https://en.wikipedia.org/wiki/Strong_cryptography (accessed 24 August 2018).
- Wikipedia. Security level. Available from: https://en.wikipedia.org/wiki/Security_level (accessed 24 August 2018).