Publications
In press

;
in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (in press)
2021

; ;
in 2021 34th IEEE Computer Security Foundations Symposium (2021)
2020

; ;
in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

;
in 25th Australasian Conference on Information Security and Privacy (2020)

; ; ;
in New Security Paradigms Workshop (2020)

; ;
in Information Processing Letters (2020)

;
in Proceedings of the 6th International Conference on Information Systems Security and Privacy (2020)

; ; ; ; ; ; ;
in Ghamizi, Salah; Rwemalika, Renaud; Cordy, Maxime; Veiber, Lisa; Bissyande, Tegawendé François D Assise; Papadakis, Mike; Klein, Jacques; Le Traon, Yves (Eds.) Data-driven simulation and optimization for covid-19 exit strategies (2020, August)

; ;
in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

; ; ; ; ;
E-print/Working paper (2020)

; ; ;
in 2020 IEEE 33rd Computer Security Foundations Symposium (2020)

; ; ; ;
in Proceedings of the 28th International Conference on Computational Linguistics (2020, December)

; ; ; ; ; ; ; ;
E-print/Working paper (2020)

; ; ;
in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

;
in Journal of Open Access to Law (JOAL) (2020), 8(1),

;
in Computer Law and Security Review (2020), 37(105402),

;
in Design Issues (2020), 36(3), 82-96

;
in Leenes, Ronald; Hallinan, Dara; Gutwirth, Serge; de Hert, Paul (Eds.) Data Protection and Privacy: Data Protection and Democracy (2020)

; ;
in Computers and Security (2020)

;
in Loreti, Michele; Spalazzi, Luca (Eds.) Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (2020)

;
in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

; ;
in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)

; ; ; ;
in Veiber, Lisa; Allix, Kevin; Arslan, Yusuf; Bissyande, Tegawendé François D Assise; Klein, Jacques (Eds.) Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20) (2020, July)

; ;
in International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting (2020, February)
2019

;
in Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione (2019), XLI(1/2019), 225-242

; ;
in IEEE Security and Privacy (2019), 17(6), 37-45

; ;
in JSAI International Symposium on Artificial Intelligence (2019), 11717

; ; ; ; ;
in Innovative Security Solutions for Information Technology and Communications (2019, November 14)

; ; ; ;
in Laurent, Maryline; Giannetsos, Thanassis (Eds.) Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (2019, December)

; ; ;
Scientific Conference (2019, August)

; ;
in Progress in Cryptology – INDOCRYPT 2019 (2019, December)

; ; ; ; ;
in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

; ;
in Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (2019)

; ; ;
in Information Systems Security and Privacy (2019, July)

; ;
in Proceedings of the Third Central European Cybersecurity Conference (2019)

; ;
in Proceedings of the 35th Annual Computer Security Applications Conference (2019)

; ;
in Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019)

;
in Codes, Cryptology and Information Security (2019)

;
in From Software Engineering to Formal Methods and Tools, and Back (2019)

; ; ;
in E-Business and Telecommunications - 2019 (2019)

; ; ;
in An offline dictionary attack against zkPAKE protocol (2019)

; ; ; ;
in Lecture Notes in Computer Science (2019, February)

in 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019 (2019)

; ;
in Proceedings on Privacy Enhancing Technologies (2019, July)

;
in Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers (2019)

in Information Processing Letters (2019), 147

E-print/Working paper (2019)

; ; ; ; ;
in Journal of Logic, Language and Information (2019)

; ; ;
in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) 22nd International Legal Infomatics Symposium IRIS 2019 (2019)

; ; ;
in Droit de la Consommation (2019), (1),

;
in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

;
in Peruginelli, Ginevra; Faro, Sebastiano (Eds.) Knowledge of the Law in the Big Data Age (2019)

; ;
in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

;
in Emerging Technologies for Authorization and Authentication (2019)

; ; ; ; ;
in Electronic Voting (2019, October)
2018

; ; ; ; ; ;
E-print/Working paper (2018)

; ; ;
E-print/Working paper (2018)

; ; ;
in Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (2018, November 02)

; ;
Scientific Conference (2018, November 12)

; ;
in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

; ;
in Advances in Cybersecurity 2018 (2018)

; ; ;
in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

; ;
in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

; ; ;
in Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

;
in Wireless Personal Communications (2018), 98(1), 1135-1154

; ;
in IEEE Communications Magazine (2018), 56(2), 158-162

; ;
in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

;
in Quantum Information and Computation (2018), 18(7&8), 06170631

; ; ; ;
in International Conference on Electronic Government and the Information Systems Perspective (2018)

; ; ;
in Schweighofer, Erich (Ed.) Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

; ;
E-print/Working paper (2018)

;
in Pagallo, Ugo; Palmirani, Monica; Casanovas, Pompeu; Sartor, Giovanni; Villata, Serena (Eds.) AI Approaches to the Complexity of Legal Systems: AICOL International Workshops 2015–2017: AICOL-VI@ JURIX 2015, AICOL-VII@ EKAW 2016, AICOL-VIII@ JURIX 2016, AICOL-IX@ ICAIL 2017, and AICOL-X@ JURIX 2017, Revised Selected Papers (2018)

; ; ; ; ;
in Advanced Materials (2018)

;
in Skrobot, Marjan; Lancrenon, Jean (Eds.) 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (2018, April)

;
in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (2018, June)

; ;
in Emerging Technologies for Authorization and Authentication (2018, November)

Doctoral thesis (2018)

; ; ;
Poster (2018, October)
2017

; ; ;
in Journal of Parallel & Distributed Computing (2017)

; ;
in Private Verification of Access on Medical Data: An Initial Study (2017, September)

; ; ;
in Bosse, Tibor; Bredeweg, Bert (Eds.) Communications in Computer and Information Science (2017)

; ; ; ;
in IEEE Transactions on Information Forensics & Security (2017)

; ; ;
in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

; ;
in Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice (2017)

; ;
in Advances in Cybersecurity 2017 (2017)

; ;
in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

;
in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

; ; ;
in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

; ;
in IET Information Security (2017)

; ; ; ; ; ;
in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

; ; ; ; ;
in IEEE Transactions on Computers (2017), 66(5), 773-785

; ; ;
in IEEE 24th Symposium on Computer Arithmetic - ARITH24 (2017, August 01)

; ; ; ;
in Homma, Naofumi; Fischer, Wieland (Eds.) International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (2017, August 25)

; ; ;
in Proceedings of the International Conference on Security and Cryptography (2017)

; ; ;
in 22nd Australasian Conference on Information Security and Privacy - ACISP2017 (2017, July 03)

; ; ; ;
in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

;
in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

; ;
in Proceedings of TrustBus 2017 (2017, July)

in Information Processing Letters (2017)

;
in Edelmann, Noella; Parycek, Peter (Eds.) Proceedings of the 7th International Conference for E-Democracy and Open Government (2017)

; ; ; ; ;
in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Doctoral thesis (2017)

;
in IFIP Information Security & Privacy Conference (2017, May)

; ; ; ; ;
in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

; ;
in IEEE Systems Journal (2017), 11(2),

; ; ; ;
in The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17 (2017, August)
2016

; ;
in Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology (2016, December)

; ; ;
in IEEE International Conference on High Performance Computing Simulation (HPCS) (2016, July)

; ; ;
in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

; ;
in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

; ;
in Advances in Cryptology – CRYPTO 2016 (2016, August 14)

; ; ; ; ;
Book published by Springer (2016)

;
in Designs, Codes and Cryptography (2016)

; ;
in Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (2016)

; ;
in Dunkelman, Orr; Sanadhya, Somitra Kumar (Eds.) Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings (2016)

; ;
in Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers (2016)

;
in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

; ; ; ;
in Journal of Cryptographic Engineering (2016), 6(3), 229-238

; ; ;
E-print/Working paper (2016)

; ; ; ; ;
in Scientific Reports (2016), 6(26840), 1-8

; ;
in Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers (2016)

;
Book published by Auerbach Publications (2016)

; ;
in 15th International Conference on Cryptology and Network Security (2016)

;
in 12th International Workshop on Security and Trust Management (STM), 2016. (2016)

;
in Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID) (2016)

in Stajano, Frank; Mjolsnes, Stig; Jenkinson, Graeme; Thorsheim, Per (Eds.) Technology and practice of passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings (2016, March)

; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

; ; ;
in Liu, Joseph K.; Steinfeld, Ron (Eds.) Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (2016, July)

; ; ;
in IEEE Transactions on Information Forensics and Security (2016), 11(7), 1385-1397

;
Poster (2016, November 03)

; ;
Scientific Conference (2016, June 27)

Doctoral thesis (2016)

; ; ;
in Yung, Moti; Zhang, Jianbiao; Yang, Zhen (Eds.) Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (2016, March)

;
in Proceedings of the 4th World Conference on Information Systems and Technologies (2016)

in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December)

; ;
in International Journal of Information Security (2016)

in The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (2016)

; ;
Book published by Springer (2016)

; ;
in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

; ; ;
in Security and Communication Networks (2016), 9(18), 5401-5411

; ;
in The International Workshop on AI for Privacy and Security (PrAISe), 2016. (2016)

;
in IEEE Transactions on Dependable and Secure Computing (2016, November)

; ; ; ; ;
in Aquatic Invasions (2016)

;
in ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE (2016, December 12)
2015

; ;
in Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (2015, November 25)

; ;
in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

;
Scientific Conference (2015, July 13)

; ; ; ; ; ; ; ; ; ;
in Socio-Technical Security Metrics (2015)

; ; ; ;
in Proc. of the New Security Paradigm Workshop (2015)

; ; ; ;
in Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (2015)

;
in Information Security - 18th International Conference, ISC 2015 (2015, September)

; ; ; ;
in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

; ; ; ; ;
in Communications in Computer and Information Science (2015), 554

; ; ;
in Foresti, Sara (Ed.) Security and Trust Management (2015)

; ; ; ;
in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

; ; ; ;
in Lecture Notes in Computer Science (2015), 9190

;
in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

; ;
in T. Tryfonas, I. Askoxylakis (Ed.) Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (2015)

; ;
in IACR Cryptology ePrint Archive (2015), 2015

;
in Journal of High Energy Physics [=JHEP] (2015), 7

;
in Progress in Cryptology -- LATINCRYPT 2015 (2015)

; ; ; ; ; ; ; ; ;
in Microbiome (2015)

;
in Advances in Intelligent Systems and Computing (2015)

; ;
in Computers electrical engineering (2015)

; ; ; ; ;
in Medical Data Privacy Handbook 2015 (2015)

; ; ; ;
in Bao, Feng; Miller, Steven; Zhou, Jianying; Ahn, Gail-Joon (Eds.) ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (2015, April)

; ; ; ; ;
in Güneysu, Tim; Handschuh, Helena (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (2015, September)

;
in Journal of Ambient Intelligence and Humanized Computing (2015), 6(3), 361-373

; ;
in Abstract book of 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

; ;
in IEEE SECURITY & PRIVACY (2015), 13(3), 59-62

;
in Lopez, Javier; Mitchell, Chris J. (Eds.) Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (2015, September)

in Information Security and Privacy - 20th Australasian Conference, ACISP 2015 (2015)

; ;
in Computer Journal (2015), 58(4), 11

;
in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security (2015, September)
2014

; ; ; ;
in Journal of High Energy Physics [=JHEP] (2014)

;
in 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14) (2014)

; ; ;
in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

; ;
in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

;
Scientific Conference (2014)

; ; ; ; ; ; ;
in PST2014 International Conference on Privacy, Security and Trust (2014)

; ; ; ;
in IEEE Trans. Parallel Distrib. Syst. (2014), 25(9), 2386-2396

; ; ; ; ; ;
in Theoretical Computer Science (2014)

;
in Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014 (2014)

; ;
in Journal of High Energy Physics [=JHEP] (2014), 1410

; ; ;
in Huang, Xinyi; Zhou, Jianying (Eds.) Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (2014, May)

; ;
in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ; ;
in IEEE 3rd International Conference on Serious Games and Applications in Healthcare (2014, May)

; ;
in Security Protocols XXII - Lecture Notes in Computer Science (2014)

in Journal of Information Security and Applications (2014)

; ;
in The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy (2014)

in Sokratis; Agudo, Isaac (Eds.) Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (2014, September)

;
in Pointcheval, David; Vergnaud, Damien (Eds.) Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (2014, May)

; ; ;
in Hui, Lucas C. K.; Qing, Sihan; Shi, Elaine; Yiu, Siu-Ming (Eds.) Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (2014, December)

; ;
in Boureanu, Ioana; Owezarski, Philippe; Vaudenay, Serge (Eds.) Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (2014, June)

; ; ; ; ;
in Computers & Structures (2014), 135

; ; ; ; ;
in IACR Cryptology ePrint Archive (2014)

; ; ; ;
in Kim, Jongsung; Lee, Jooyoung (Eds.) Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers (2014, December)

in The Computer Journal (2014)

in IEEE Transactions on Information Forensics & Security (2014)

; ; ;
in Shi, Elaine; Yiu, S.M. (Eds.) Information and Communications Security (2014, December)
2013

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

; ; ; ;
in Chen, Kefei; Xie, Qi; Qiu, Weidong; Xu, Shouhuai; Zhao, Yunlei (Eds.) Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

; ;
in Journal of High Energy Physics (2013), 2013(2),

; ;
in Journal of High Energy Physics (2013), 2013(1),

; ;
in Journal of High Energy Physics [=JHEP] (2013)

; ;
in International Journal of Modern Physics: Conference Series (2013)

; ; ; ; ;
in Journal of Election Technology and Systems (2013), 2(1),

; ; ; ; ;
in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II (2013)

Scientific Conference (2013, July)

; ; ; ;
in IEEE TrustCom (2013)

; ; ; ;
in Lecture Notes in Computer Science (2013), 8203

; ;
in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)

;
in Computational Logic in Multi-Agent Systems (2013, September 16)

; ;
in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

; ; ;
in Computer And Information Security Handbook (2013)

; ;
in Lin, Dongdai; Xu, Shouhuai; Yung, Moti (Eds.) Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (2013, November)

; ; ;
in Qing, Sihan; Zhou, Jianying; Liu, Dongmei (Eds.) Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (2013, November)

; ; ; ;
in Composite Structures (2013), 105

; ;
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

;
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

; ; ;
in 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

; ;
in International Journal of Approximate Reasoning (2013), 54(1), 228-251

; ; ; ; ;
in 53 USENIX Journal of Election Technology and Systems (JETS) (2013), 1(1), 53-61

; ; ; ; ;
in USENIX Journal of Election Technology and Systems (JETS) (2013), 2(1),

; ; ;
in The 14th International Conference on Cryptology in India -- INDOCRYPT 2013 (2013), 8250

; ; ; ; ;
in Sensors (2013)

in Theory and Practice of Cryptography Solutions for Secure Information Systems (2013)

in Sandhu, Ravi; Lopez, Javier; Huang, Xinyi (Eds.) Towards a privacy-preserving solution for OSNs (2013)

;
in Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013)

; ; ; ; ; ;
in Computers & Security (2013), 39
2012

; ; ;
in Proceedings of the 2nd Joint International Semantic Technology Conference (JIST) (2012)

; ; ; ; ; ; ; ; ;
in EVOTE 2012 (2012)

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

; ; ;
in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)

;
Book published by IEEE (2012)

;
in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

; ; ; ; ; ; ; ; ;
in Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (2012)

; ;
in Lecture Notes in Computer Science (2012), 6573 LNAI

; ; ; ;
in Proceedings of the IEEE Congress on Evolutionary Computation (2012)

; ; ;
in SECURITY AND COMMUNICATION NETWORKS (2012), 5(8), 831-833
2011

; ;
in Computers & Security (2011), 30(8), 705-718

; ; ;
Book published by IEEE (2011)

; ;
in Security and Intelligent Information Systems - International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (2011)

;
in 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (2011)

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

in Liu, Weiru (Ed.) Symbolic and Quantitative Approaches to Reasoning with Uncertainty (2011)

in Butz, Cory; Lingras, Pawan (Eds.) Advances in Artificial Intelligence (2011)

;
Book published by John Wiley & Sons (2011)

; ;
in Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (Eds.) Self-Organizing Software - From Natural to Artificial Adaptation (2011)
2010

; ;
in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)

; ; ; ; ; ;
in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)
2009

in de Lemos, R.; Fabre, J. C.; Gacek, C.; Gadducci, F.; ~ter Beek, M. H. (Eds.) Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (2009)
Undated

; ;
Learning material (n.d.)

; ;
E-print/Working paper (n.d.)