Publications
In press

Bongard, K., Sterckx, J.-L., Rossi, A., Distler, V., Rivas, S., & Koenig, V. (in press). An (Un)Necessary Evil - Users’ (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering. 2022 7th IEEE European Symposium on Security and Privacy Workshops (EuroSPW). IEEE.
2023

Haines, T., Mueller, J., Mosaheb, R., & Pryvalov, I. (2023). SoK: Secure E-Voting with Everlasting Privacy. Proceedings on Privacy Enhancing Technologies (PoPETs).

Haines, T., Mueller, J., & Querejeta-Azurmendi, I. (2023). Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions. Proceedings of ACM SAC Conference (SAC'23).
2022

Alsahli, M. R. M., Borgognoni, A., Cardoso Dos Santos, L., Cheng, H., Franck, C., & Groszschädl, J. (2022). Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things. In G., Bella, M., Doinea, & H., Janicke (Eds.), Innovative Security Solutions for Information Technology and Communications, 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers (pp. 17-36). Springer Verlag.

Damodaran, A. S. S. (2022). Protocols for Stateful Zero-Knowledge. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. Y. A. (Promotor), Coron, J.-S., Rial, A., Roenne, P., & Camenisch, J.

Cheng, H., Groszschädl, J., Marshall, B., Page, D., & Pham, T. (2022). RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(1), 193-237.

Arenas Correa, M. P., Bingol, M. A., Demirci, H., Fotiadis, G., & Lenzini, G. (2022). A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption. Lecture Notes in Computer Science, 13503, 23.

Ebrahimi, E., & van Wier, J. (2022). Post-quantum Plaintext-awareness. Post-quantum Plaintext-awareness. Springer.

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A., Holzinger, P., Kieseberg, A. M., Tjoa, & E., Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer.

Human, S., Degeling, M., Santos, C., Pandit, H., Morel, Rossi, A., Botes, W. M., Jesus, V., & Kamara, I. (2022, June 06). Data Protection and Consenting Communication Mechanisms: Current Proposals and Challenges. IEEE eXplore.

Lothritz, C., Lebichot, B., Allix, K., Veiber, L., Bissyande, T. F. D. A., Klein, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089).

Botes, W. M., Carli, R., Rossi, A., Sanchez Chamorro, L., Santos, C., & Sergeeva, A. (2022). Feedback to the Guidelines 3/2022 on “Dark patterns in social media platform interfaces: How to recognise and avoid them”.

Doan, X. C., Selzer, A., Rossi, A., Botes, W. M., & Lenzini, G. (2022, April 26). Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. Web Conference Companion Volume (ACM).

Stojkovski, B. (2022). User Experience Design for Cybersecurity & Privacy: addressing user misperceptions of system security and privacy. Unpublished doctoral thesis, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
Jury: Lenzini, G. (Promotor), Koenig, V., Ryan, P. Y. A., Volkamer, M., Biddle, R., & Wrona, K.

Soroush, N. (2022). Verifiable, Secure and Privacy-Preserving Computation. Unpublished doctoral thesis, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
Jury: Ryan, P. Y. A. (Promotor).
Damodaran, A. S. S., & Rial, A. (2022). A Compiler for Stateful Zero Knowledge Data Structures.

Ebrahimi, E. (2022). Post-quantum Security of Plain OAEP Transform. The International Conference on Practice and Theory of Public-Key Cryptography (PKC), Japan 8-11 March 2022.

Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022).

Cheng, H., Fotiadis, G., Groszschädl, J., & Ryan, P. Y. A. (2022). Highly Vectorized SIKE for AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022(2), 41-68.

Gjosteen, K., Haines, T., Mueller, J., Roenne, P., & Silde, T. (2022). Verifiable Decryption in the Head. ACISP 2022.

Huber, N., Kuesters, R., Krips, T., Liedtke, J., Mueller, J., Rausch, D., Reisert, P., & Vogt, A. (2022). Kryvos: Publicly Tally-Hiding Verifiable E-Voting. 2022 ACM SIGSAC Conference on Computer and Communications Security.

Mestel, D. (2022). Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games. 35th IEEE Computer Security Foundations Symposium.

Mestel, D., Mueller, J., & Reisert, P. (2022). How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. 35th IEEE Computer Security Foundations Symposium.

Mueller, J. (2022). Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV. Workshop on Advances in Secure Electronic Voting 2022.

Rossi, A., Chatellier, R., Leucci, S., Ducato, R., & Hary, E. (2022). What if data protection embraced foresight and speculative design? DRS2022: Bilbao.

Rossi, A., Kumari, A., & Lenzini, G. (2022). Unwinding a Legal and Ethical Ariadne’s Thread Out of the Twitter Scraping Maze. In S., Schiffner, S., Ziegler, & A., Quesada Rodriguez (Eds.), Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (pp. 179-203). Springer.
2021

Stojkovski, B., Lenzini, G., Koenig, V., & Rivas, S. (2021). What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. Annual Computer Security Applications Conference (ACSAC ’21) (pp. 385–398). New York, NY, USA: ACM.

Santos, C.* , Rossi, A.* , Sanchez Chamorro, L., Bongard, K., & Abu-Salma, R. (2021, November 15). Cookie Banners, What’s the Purpose? Analyzing Cookie Banner Text Through a Legal Lens. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21).
* These authors have contributed equally to this work.

Marky, K., Zollinger, M.-L., Roenne, P., Ryan, P. Y. A., Grube, T., & Kunze, K. (2021). Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Transactions on Computer-Human Interaction, 28(5), 1-36.

Vazquez Sandoval, I., Atashpendar, A., Lenzini, G., & Ryan, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S., Obaidat & J., Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer.

Zollinger, M.-L., Estaji, E., Ryan, P. Y. A., & Marky, K. (2021). "Just for the sake of transparency": Exploring Voter Mental Models Of Verifiability. Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8.

Sala, P. (2021). Attaques et preuves de sécurité des protocoles d'échange de clés authentifiés. Unpublished doctoral thesis, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
Jury: Ryan, P. Y. A. (Promotor), Naccache, D. (Promotor), Coron, J.-S., Abdalla, M., Joye, M., Diffie, W., Gjøsteen, K., & Barbosa, M.

Ostrev, D. (2021, September 14). QKD parameter estimation by two-universal hashing leads to faster convergence to the asymptotic rate. Quantum.

Cheng, H., Fotiadis, G., Groszschädl, J., Ryan, P. Y. A., & Roenne, P. (2021). Batching CSIDH Group Actions using AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021(4), 618-649.

Stojkovski, B., Abu-Salma, R., Triquet, K., & Lenzini, G. (2021, August). "Unless One Does the Research, It May Seem as Just a Useless Battery-Consuming App" - Field Notes on COVID-19 Contact Tracing Applications. Digital Threats: Research and Practice.
Damodaran, A. S. S., & Rial, A. (2021). Implementations for Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs.

Damodaran, A. S. S., & Rial, A. (2021). Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs. Proceedings on Privacy Enhancing Technologies, 2021(3), 95-121.

Lothritz, C., Allix, K., Lebichot, B., Veiber, L., Bissyande, T. F. D. A., & Klein, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer.

Arslan, Y., Allix, K., Veiber, L., Lothritz, C., Bissyande, T. F. D. A., Klein, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery.

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2021). AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (pp. 1272-1277). IEEE.

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2(1).

Belardinelli, F., Condurache, R., Dima, C., Jamroga, W., & Knapik, M. (2021). Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting Protocol. Information and Computation, 276, 104552.

Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V., & Lenzini, G. (2021). "I am definitely manipulated, even when I am aware of it. It’s ridiculous!" - Dark Patterns from the End-User Perspective. Proceedings of ACM DIS Conference on Designing Interactive Systems. New York, NY: ACM.

Botes, W. M., & Rossi, A. (2021). Back to the Future with Icons and Images: "Low-Tech" to Communicate and Protect Privacy and Data. In R., Ducato & A., Strowel (Eds.), Legal Design Perspectives. Theoretical and Practical Insights from the Field (pp. 209-226). Ledi Publishing.

Botes, W. M., & Rossi, A. (2021). Visualisation Techniques for Consent: Finding Common Ground in Comic Art with Indigenous Populations. 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 292-297).

Boyen, X., Haines, T., & Mueller, J. (2021). Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021.

Camenisch, J., Dubovitskaya, M., & Rial, A. (2021). Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases. 2021 34th IEEE Computer Security Foundations Symposium.

Ebrahimi, E. (2021). Post-quantum Efficient Proof for Graph 3-Coloring Problem. Eprint/Working paper retrieved from https://eprint.iacr.org/2021/1286.pdf.
Ebrahimi, E., Unruh, D., Carstens, T., & Tabia, G. (2021). Relationships between quantum IND-CPA notions. Paper presented at Theory of Cryptography Conference 2021.

Haines, T., & Mueller, J. (2021). A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings.

Haines, T., & Mueller, J. (2021). Optimal Randomized Partial Checking for Decryption Mix Nets. Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings.
Jamroga, W. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Part II: Elicitation of Requirements. Eprint/Working paper retrieved from https://arxiv.org/.

Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of The Polish Academy of Sciences: Technical Science, 69(4), 137724.

Jamroga, W., Penczek, W., & Sidoruk, T. (2021). Strategic Abilities of Asynchronous Agents: Semantic Side Effects. Proceedings of AAMAS 2021 (pp. 1545--1547). ACM.

Jamroga, W., Penczek, W., & Sidoruk, T. (2021). Strategic Abilities of Asynchronous Agents: Semantic Side Effects and How to Tame Them. Proceedings of KR 2021.
Jamroga, W., Ryan, P. Y. A., Schneider, S., Schürmann, C., & Stark, P. B. (2021). A Declaration of Software Independence. Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (pp. 198--217). Springer.

Kurpiewski, D., Pazderski, W., Jamroga, W., & Kim, Y. (2021). STV+Reductions: Towards Practical Verification of Strategic Ability Using Model Reductions. Proceedings of AAMAS (pp. 1770--1772). ACM.

Rossi, A., & Bongard, K. (2021). All in one stroke? Intervention Spaces for Dark Patterns. Eprint/Working paper retrieved from https://arxiv.org/abs/2103.08483.

Rossi, A., & Haapio, H. (2021). Proactive Legal Design for Health Data Sharing based on Smart Contracts. In M., Corrales Compagnucci, M., Fenwick, & S., Wrbka (Eds.), Smart Contracts. Technological, Business and Legal Perspectives (9781509937028, pp. 101-121). Hart Publishing.

Rossi, A., & Lenzini, G. (2021). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer.

Stojkovski, B., & Lenzini, G. (2021). A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms. 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 324-330). IEEE.

Stojkovski, B., Lenzini, G., & Koenig, V. (2021). "I Personally Relate It to the Traffic Light": A User Study on Security & Privacy Indicators in a Secure Email System Committed to Privacy by Default. Proceedings of the 36th Annual ACM Symposium on Applied Computing (pp. 1235–1246). New York, NY, USA: Association for Computing Machinery.
2020

Lothritz, C., Allix, K., Veiber, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760).
Damodaran, A. S. S., & Rial, A. (2020). Implementations for Unlinkable Updatable Databases and Oblivious Transfer with Access Control.

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2020). Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. In P.-Y., Liardet & N., Mentens (Eds.), Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (pp. 18-33). Springer Verlag.
Mossong, J., Mombaerts, L., Veiber, L., Pastore, J., LeCoroller, G., Schnell, M., Masi, S., Huiart, L., & Wilmes, P. (2020). SARS-CoV-2 Transmission in Educational Settings During an Early Summer Epidemic Wave in Luxembourg. Eprint/Working paper retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3696896.

Genç, Z. A. (2020). Analysis, Detection, and Prevention of Cryptographic Ransomware. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Lenzini, G. (Promotor), Ryan, P. Y. A., Mauw, S., Lanet, J.-L., & Stringhini, G.

Cheng, H., Groszschädl, J., Tian, J., Roenne, P., & Ryan, P. Y. A. (2020). High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. In O., Dunkelman, M. J., Jacobson Jr., & C., O'Flynn (Eds.), Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 698-719). Springer Verlag.

Zollinger, M.-L. (2020). From Secure to Usable and Verifiable Voting Schemes. Unpublished doctoral thesis, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
Jury: Ryan, P. Y. A. (Promotor).

Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S., Ghamizi, R., Rwemalika, M., Cordy, L., Veiber, T. F. D. A., Bissyande, M., Papadakis, J., Klein, & Y., Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, USA: Association for Computing Machinery.
Damodaran, A. S. S., & Rial, A. (2020). Implementations for UC Updatable Databases and Applications.

Rossi, A., & Lenzini, G. (2020). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law & Security Review, 37(105402).

Veiber, L., Allix, K., Arslan, Y., Bissyande, T. F. D. A., & Klein, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L., Veiber, K., Allix, Y., Arslan, T. F. D. A., Bissyande, & J., Klein, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association.

Rossi, A., & Palmirani, M. (2020). Can Visual Design Provide Legal Transparency? The Challenges for Successful Implementation of Icons for Data Protection. Design Issues, 36(3), 82-96.

Ostrev, D. (2020). Deniable encryption, authentication, and key exchange. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/42816.

Rossi, A., & Lenzini, G. (2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law, 8(1).

Zollinger, M.-L., Roenne, P., & Ryan, P. (2020). Short paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme. International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting.

Rossi, A., & Palmirani, M. (2020). What's in an Icon? Promises and Pitfalls of Data Protection Iconography. In R., Leenes, D., Hallinan, S., Gutwirth, & P., de Hert (Eds.), Data Protection and Privacy: Data Protection and Democracy (pp. 59 - 92). Oxford: Hart Publishing.

Boyd, C., Haines, T., & Roenne, P. (2020). Vote Selling Resistant Voting. Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (pp. 345--359). Springer.

Boyen, X., Haines, T., & Mueller, J. (2020). A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II.

Damodaran, A. S. S., & Rial, A. (2020). UC Updatable Databases and Applications. 12th International Conference on Cryptology.

Damodaran, A. S. S., & Rial, A. (2020). Unlinkable Updatable Databases and Oblivious Transfer with Access Control. 25th Australasian Conference on Information Security and Privacy.

Ding, J., Emery, D., Mueller, J., Ryan, P. Y. A., & Kee Wong, V. (2020). Post-Quantum Anonymous Veto Networks. E-Vote-ID 2020.

Estaji, E., Haines, T., Gjoesteen, K., Roenne, P., Ryan, P. Y. A., & Soroush, N. (2020). Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (pp. 50--66). Springer.

Genç, Z. A., Iovino, V., & Rial, A. (2020). "The Simplest Protocol for Oblivious Transfer'' Revisited. Information Processing Letters.

Genç, Z. A., & Lenzini, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress.

Haines, T., Pereira, O., & Roenne, P. (2020). Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities. Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (pp. 360--368). Springer.

Hollenstein, M., Naccache, D., Roenne, P., Ryan, P. Y. A., Weil, R., & Yifrach-Stav, O. (2020). Preservation of DNA Privacy During the Large Scale Detection of COVID-19. Eprint/Working paper retrieved from https://arxiv.org/abs/2007.09085.

Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. 2020 IEEE 33rd Computer Security Foundations Symposium.

Jamroga, W., Kim, Y., Kurpiewski, D., & Ryan, P. Y. A. (2020). Towards Model Checking of Voting Protocols in Uppaal. Proceedings of the Fifth International Joint Conference on Electronic Voting E-VOTE-ID 2020. Springer.

Jamroga, W., Konikowska, B., Kurpiewski, D., & Penczek, W. (2020). Multi-valued Verification of Strategic Ability. Fundamenta Informaticae, 175(1-4), 207-251.

Jamroga, W., Kurpiewski, D., & Malvone, V. (2020). Natural Strategic Abilities in Voting Protocols. Proceedings of the 10th International Workshop on Socio-Technical Aspects in Security STAST 2020. Springer.

Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. Eprint/Working paper retrieved from https://arxiv.org/abs/2011.07887.

Jamroga, W., Penczek, W., Sidoruk, T., Dembiński, P., & Mazurkiewicz, A. (2020). Towards Partial Order Reductions for Strategic Ability. Journal of Artificial Intelligence Research, 68, 817-850.

Mestel, D. (2020). Robust ambiguity for contact tracing. Eprint/Working paper retrieved from https://arxiv.org/abs/2007.01288.

Mueller, J. (2020). Ordinos: A Verifiable Tally-Hiding E-Voting System. In R., Küsters, J., Liedtke, J., Mueller, D., Rausch, & A., Vogt, IEEE European Symposium on Security and Privacy.

Mueller, J. (2020). SoK: Techniques for Verifiable Mix Nets. In T., Haines & J., Mueller, IEEE Computer Security Foundations Symposium.

Niewiadomski, A., Kacprzak, M., Kurpiewski, D., Knapik, M., Penczek, W., & Jamroga, W. (2020). MsATL: a Tool for SAT-Based ATL Satisfiability Checking. Proceedings of 19th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2020.

Roenne, P., Atashpendar, A., Kristian, G., & Ryan, P. (2020). Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC. Springer.

Soroush, N., Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). Verifiable Inner Product Encryption Scheme. Public-Key Cryptography – PKC 2020.

Stojkovski, B., & Lenzini, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M., Loreti & L., Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org.
2019

Cheng, H., Dinu, D.-D., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M., Laurent & T., Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag.

Damodaran, A. S. S., Dubovitskaya, M., & Rial, A. (2019). UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing. Progress in Cryptology – INDOCRYPT 2019 (pp. 273-296).

Beunardeau, M., El Orche, F. E., Maimut, D., Naccache, D., Roenne, P., & Ryan, P. (2019). Authenticated Key Distribution: When the Coupon Collector is Your Enemy. Innovative Security Solutions for Information Technology and Communications. Springer.

Fotiadis, G., & Konstantinou, E. (2019). TNFS Resistant Families of Pairing-Friendly Elliptic Curves. Theoretical Computer Science, 800, 73-89.

Zollinger, M.-L., Distler, V., Roenne, P., Ryan, P., Lallemand, C., & Koenig, V. (2019). User Experience Design for E-Voting: How mental models align with security mechanisms. Electronic Voting.
Pejo, B. (2019). Integrity and Confidentiality Problems of Outsourcing. Unpublished doctoral thesis, University of Luxembourg, Esch/Alzette, Luxembourg.
Jury: Ryan, P. (Promotor), Le Traon, Y., Tang, Q., Claudia, D., & Melek, O.

Groszschädl, J., Liu, Z., Hu, Z., Su, C., & Zhou, L. (2019). Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019) (pp. 1-8). IEEE.

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. Eprint/Working paper retrieved from http://csrc.nist.gov/Events/2019/second-pqc-standardization-conference.

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. Information Systems Security and Privacy (pp. 125-151). Cham: Springer International Publishing.

Pejo, B., Tang, Q., & Biczók, G. (2019, July). Together or Alone: The Price of Privacy in Collaborative Learinig. Proceedings on Privacy Enhancing Technologies.

Rial, A. (2019). A conditional access system with revocation for mobile pay-TV systems revisited. Information Processing Letters, 147, 6-9.

Fotiadis, G., & Martindale, C. (2019). Optimal TNFS-secure pairings on elliptic curves with composite embedding degree. Eprint/Working paper retrieved from https://eprint.iacr.org/2019/555.

Distler, V., Zollinger, M.-L., Lallemand, C., Roenne, P., Ryan, P., & Koenig, V. (2019, April). Security – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019).

Rossi, A. (2019). Legal Design for the General Data Protection Regulation. A Methodology for the Visualization and Communication of Legal Concepts. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Palmirani, M. (Promotor), van der Torre, L. (Promotor), Lorini, G., Mahler, T., & Durante, M.

Marky, K., Zollinger, M.-L., Funk, M., Ryan, P., & Mühlhäuser, M. (2019, February). How to Assess the Usability Metrics of E-Voting Schemes. Lecture Notes in Computer Science.
Atashpendar, A. (2019). From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Cremers, C., Ding, J., & Roenne, P.

Belardinelli, F., Jamroga, W., Kurpiewski, D., Malvone, V., & Murano, A. (2019). Strategy Logic with Simple Goals: Tractable Reasoning about Strategies. Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (pp. 88--94).

Bulling, N., Jamroga, W., & Popovici, M. (2019). Reasoning about Strategic Abilities: Agents with Truly Perfect Recall. ACM Transactions on Computational Logic, 20(2), 10:1--10:46.

Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer.

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. Proceedings of the Third Central European Cybersecurity Conference. New York, US: ACM.

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, USA: ACM.

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer.

Iovino, V., & Visconti, I. (2019). Non-interactive Zero Knowledge Proofs in the Random Oracle Model. Codes, Cryptology and Information Security (pp. 118-141). Springer, Cham.

Jamroga, W., Knapik, M. L., Kurpiewski, D., & Mikulski, L. (2019). Approximate Verification of Strategic Abilities under Imperfect Information. Artificial Intelligence and Law, 277.

Jamroga, W., & Knapik, M. (2019). Some Things are Easier for the Dumb and the Bright Ones (Beware the Average!). Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI (pp. 1734--1740).

Jamroga, W., Malvone, V., & Murano, A. (2019). Natural Strategic Ability. Artificial Intelligence and Law, 277.

Jamroga, W., Malvone, V., & Murano, A. (2019). Natural Strategic Ability under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 962--970). IFAAMAS.

Jamroga, W., Roenne, P., Ryan, P., & Stark, P. B. (2019). Risk-Limiting Tallies. Electronic Voting: Proceedings of E-Vote-ID (pp. 183--199).

Knapik, M., André, É., Petrucci, L., Jamroga, W., & Penczek, W. (2019). Timed ATL: Forget Memory, Just Count. Journal of Artificial Intelligence Research, 66, 197--223.

Kurpiewski, D., Jamroga, W., & Knapik, M. L. (2019). STV: Model Checking for Strategies under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 2372--2374). IFAAMAS.

Kurpiewski, D., Knapik, M. L., & Jamroga, W. (2019). On Domination and Control in Strategic Ability. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 197--205). IFAAMAS.

Kurpiewski, D., Knapik, M., & Jamroga, W. (2019). On Domination and Control in Strategic Ability (Extended Abstract). Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC).

Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2019). On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy. E-Business and Telecommunications - 2019, 173-198.

Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2019). An offline dictionary attack against zkPAKE protocol. An offline dictionary attack against zkPAKE protocol. Springer.

Mestel, D. (2019). Quantifying information flow in interactive systems. 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).

Mestel, D. (2019). Widths of regular and context-free languages. 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.

Ostrev, D. (2019). Composable, Unconditionally Secure Message Authentication without any Secret Key. 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019. IEEE.

Ostrev, D. (2019). An introduction to the theory of unconditionally secure message authentication using the constructive cryptography framework. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39497.

Pereira, O., & Roenne, P. (2019). End-to-End Verifiable Quadratic Voting with Everlasting Privacy. Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers (pp. 314--329). Springer.

Rial, A. (2019). UC Updatable Non-Hiding Committed Database with Efficient Zero-Knowledge Proofs. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/39421.

Robaldo, L., Bartolini, C., Lenzini, G., Rossi, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information.

Rossi, A., Ducato, R., Haapio, H., & Passera, S. (2019). Legal Design Patterns: Towards A New Language for Legal Information Design. In E., Schweighofer, F., Kummer, & A., Saarenpää (Eds.), 22nd International Legal Infomatics Symposium IRIS 2019.

Rossi, A., Ducato, R., Haapio, H., & Passera, S. (2019). When Design Met Law: Design Patterns for Information Transparency. Droit de la Consommation, (1).

Rossi, A., & Haapio, H. (2019). Proactive Legal Design: Embedding Values in the Design of Legal Artefacts. In E., Schweighofer, F., Kummer, & A., Saarenpää (Eds.), International Legal Infomatics Symposium IRIS 2019 (pp. 537–544).

Rossi, A., Lenzini, G., Koenig, V., & Bongard-Blanchy, K. (2019). Dark Patterns: Deception or Simply Bad Design? Poster session presented at ESORICS, Luxembourg.

Rossi, A., & Palmirani, M. (2019). DaPIS: an Ontology-Based Data Protection Icon Set. In G., Peruginelli & S., Faro (Eds.), Knowledge of the Law in the Big Data Age (pp. 181 - 195). IOS Press.

Stojkovski, B., Vazquez Sandoval, I., & Lenzini, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops.

Wang, J., Tang, Q., Delerue Arriaga, A., & Ryan, P. Y. A. (2019). Novel Collaborative Filtering Recommender Friendly to Privacy Protection. International Joint Conference on Artificial Intelligence (IJCAI 2019), Macao 10-16 August 2019. Macao: International Joint Conferences on Artificial Intelligence Organization.

Yazdanpanah, V., Dastani, M., Alechina, N., Logan, B., & Jamroga, W. (2019). Strategic Responsibility Under Imperfect Information. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems AAMAS 2019 (pp. 592--600). IFAAMAS.
2018

Ghatpande, S., Groszschädl, J., & Liu, Z. (2018). A Family of Lightweight Twisted Edwards Curves for the Internet of Things. In O., Blazy & C. Y., Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag.

Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing.

Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer.

Cheng, H., Dinu, D.-D., & Groszschädl, J. (2018). Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers. In J.-L., Lanet & C., Toma (Eds.), Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (pp. 273-287). Springer Verlag.

Rossi, A., & Palmirani, M. (2018). From Words to Images Through Legal Visualization. In U., Pagallo, M., Palmirani, P., Casanovas, G., Sartor, & S., Villata (Eds.), AI Approaches to the Complexity of Legal Systems: AICOL International Workshops 2015–2017: AICOL-VI@ JURIX 2015, AICOL-VII@ EKAW 2016, AICOL-VIII@ JURIX 2016, AICOL-IX@ ICAIL 2017, and AICOL-X@ JURIX 2017, Revised Selected Papers (pp. 72-85). Springer Cham.

Vazquez Sandoval, I., Lenzini, G., & Stojkovski, B. (2018). A Protocol to Strengthen Password-Based Authentication. Emerging Technologies for Authorization and Authentication (pp. 38-46).

Lopez Becerra, J. M., Ostrev, D., & Skrobot, M. (2018). Forward Secrecy for SPAKE2. In J., Baek & S., Willy (Eds.), Provable Security (pp. 366-384). Springer International Publishing.

Wang, J. (2018). Privacy-preserving Recommender Systems Facilitated By The Machine Learning Approach. Unpublished doctoral thesis, University of Luxembourg, Esch-sur-Alzette, Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Tang, Q., DOMINGO-FERRER, J., & PALAMIDESSI, C.

Fotiadis, G., & Martindale, C. (2018). Optimal TNFS-secure pairings on elliptic curves with even embedding degree. Eprint/Working paper retrieved from https://eprint.iacr.org/2018/969.

Pejo, B., Tang, Q., & Gergely, B. (2018, October). The Price of Privacy in Collaborative Learning. Poster session presented at The 25th ACM Conference on Computer and Communications Security, Toronto, Canada.

Roenne, P., Ryan, P., & Zollinger, M.-L. (2018). Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/37857.
Wang, J., Delerue Arriaga, A., Tang, Q., & Ryan, P. (2018, October). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. Poster session presented at the 2018 ACM SIGSAC Conference.

Atashpendar, A., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. Eprint/Working paper retrieved from https://arxiv.org/abs/1807.11609.

Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2018, June). An Offline Dictionary Attack Against zkPAKE Protocol. Poster session presented at WiSec2018, Stockholm, Sweden.

Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018, May 14). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382.

Skrobot, M., & Lancrenon, J. (2018). On Composability of Game-based Password Authenticated Key Exchange. In M., Skrobot & J., Lancrenon, 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 443-457). London, UK: IEEE.

Fotiadis, G., & Konstantinou, E. (2018). Generating Pairing-Friendly Elliptic Curve Parameters Using Sparse Families. Journal of Mathematical Cryptology, 12(2), 83-99.

Atashpendar, A., Beunardeau, M., Connolly, A., Géraud, R., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. Eprint/Working paper retrieved from https://arxiv.org/abs/1802.00703.

Liu, Z., Choo, K.-K. R., & Groszschädl, J. (2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56(2), 158-162.
Genç, Z. A. (2018). Crypren Decryptor.

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing.

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer.

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Advances in Cybersecurity 2018.

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. Proceedings of the 4th International Conference on Information Systems Security and Privacy.

Haapio, H., Hagan, M., Palmirani, M., & Rossi, A. (2018). Legal Design Patterns for Privacy. Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018.

Kardaş, S., & Genç, Z. A. (2018). Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols. Wireless Personal Communications, 98(1), 1135-1154.

Ostrev, D., & Vidick, T. (2018). Entanglement of Approximate Quantum Strategies in XOR Games. Quantum Information and Computation, 18(7&8), 0617–0631.

Palmirani, M., Bartolini, C., Martoni, M., Robaldo, L., & Rossi, A. (2018). Legal Ontology for Modelling GDPR Concepts and Norms. JURIX 2018 proceedings.

palmirani, M., Martoni, M., Rossi, A., Bartolini, C., & Robaldo, L. (2018). PrOnto: Privacy Ontology for Legal Reasoning. International Conference on Electronic Government and the Information Systems Perspective.

Palmirani, M., Rossi, A., Martoni, M., & Margaret, H. (2018). A Methodological Framework to Design a Machine-Readable Privacy Icon Set. In E., Schweighofer (Ed.), Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018.
Zollinger, M.-L. (2018). Selene User Interface.
2017

Seo, H., Liu, Z., Park, T., Kwon, H., Lee, S., & Kim, H. (2017). Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.

Fotiadis, G., & Konstantinou, E. (2017). Ordinary Pairing-Friendly Genus 2 Hyperelliptic Curves with Absolutely Simple Jacobians. International Conference on Mathematical Aspects of Computer and Information Sciences (pp. 409-424). Springer.

Lopez Becerra, J. M., Iovino, V., Ostrev, D., Sala, P., & Skrobot, M. (2017). Tightly-Secure PAK(E). Cryptology and Network Security. Springer.

Meng, W., Lee, W., Liu, Z., Su, C., & Li, Y. (2017). Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. The 20th Annual International Conference on Information Security and Cryptology - ICISC2017.

Xinwei, G., Li, L., Jintai, D., Jiqiang, L., Rv, S., & Liu, Z. (2017). Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. The 13th International Conference on Information Security Practice and Experience - ISPEC 2017.

Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. Proc. of the 9th IEEE Workshop on Information Forensics and Security.

Bardini Idalino, T., Pierina Brustolin Spagnuelo, D., & Everson Martina, J. (2017). Private Verification of Access on Medical Data: An Initial Study. Private Verification of Access on Medical Data: An Initial Study.

Liu, Z., Longa, P., Pereira, G., Reparaz, O., & Seo, H. (2017). FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. In N., Homma & W., Fischer (Ed.), International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (pp. 665-686).

Liu, Z., Järvinen, K., Liu, W., & Seo, H. (2017). Multiprecision Multiplication on ARMv8. IEEE 24th Symposium on Computer Arithmetic - ARITH24 (pp. 10-17).

Zuo, C., Shao, J., Liu, Z., Ling, Y., & Wei, G. (2017). Hidden-Token Searchable Public-Key Encryption. The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-17.

Meng, W., Lee, W., Au, M. H., & Liu, Z. (2017). Exploring Effect of Location Number on Map-Based Graphical Password Authentication. 22nd Australasian Conference on Information Security and Privacy - ACISP2017.

Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2017). Modelling Metrics for Transparency in Medical Systems. Proceedings of TrustBus 2017.
Atashpendar, A., Roenne, P., Ostrev, D., & Ryan, P. (2017, June 14). Deniability in Quantum Cryptography. Poster session presented at The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France.

Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2017, June 10). A Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization. Journal of Parallel and Distributed Computing.

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307.
Fotiadis, G. (2017). Constructing Suitable Parameters for Pairing-Based Cryptography. Unpublished doctoral thesis, University of the Aegean, Karlovasi Samos, Greece.
Jury: Konstantinou, E. (Promotor), Kontogeorgis, A. (Promotor), Rizomiliotis, P. (Promotor), Gritzalis, S., Poulakis, D., Garefalakis, T., & Stamatiou, Y. C.

Liu, Z., Groszschädl, J., Hu, Z., Järvinen, K., Wang, H., & Verbauwhede, I. (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66(5), 773-785.

Wang, J., & Tang, Q. (2017). Differentially Private Neighborhood-based Recommender Systems. IFIP Information Security & Privacy Conference (pp. 14). Springer.

Iovino, V., Rial, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).

Pejo, B., & Tang, Q. (2017). To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification. Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017. New York, United States of America: ACM.

Lopez Becerra, J. M., Iovino, V., & Skrobot, M. (2017, March 09). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Paper presented at Grande Region Security and Reliability Day 2017, Luxembourg Ville, Luxembourg.

Chenal, M. (2017). Key-Recovery Attacks Against Somewhat Homomorphic Encryption Schemes. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Tang, Q. (Promotor), Coron, J.-S., Ding, J., & Buchmann, J.

Delerue Arriaga, A. (2017). Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Coron, J.-S., Tang, Q., Abdalla, M., & Naccache, D.

Skrobot, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Lancrenon, J., Cremers, C., & Ding, J.

Biesmans, W., Balasch, J., Rial, A., Preneel, B., & Verbauwhede, I. (2017). Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Transactions on Information Forensics and Security.

De Caro, A.* , Iovino, V.* , & O'Neill, A.* . (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security.
* These authors have contributed equally to this work.

Desmedt, Y., Iovino, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Fotiadis, G., & Konstantinou, E. (2017). Pairing-Friendly Elliptic Curves Resistant to TNFS Attacks. Paper presented at 7th International Conference on Algebraic Informatics, Kalamata, Greece.

Genç, Z. A., Kardaş, S., & Kiraz. (2017). Examination of a New Defense Mechanism: Honeywords. Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice. Springer.

Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.

Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R., Giustolisi, V., Iovino, & G., Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.

Huynen, J.-L., & Lenzini, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. Proceedings of the 3rd International Conference on Information Systems Security and Privacy.

Iovino, V., Tang, Q., & Zebrowski, K. (2017). On the power of Public-key Function-Private Functional Encryption. IET Information Security.

Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.

Rial, A. (2017). Issuer-Free Oblivious Transfer with Access Control Revisited. Information Processing Letters.

Rossi, A., & Palmirani, M. (2017). A Visualization Approach for Adaptive Consent in the European Data Protection Framework. In N., Edelmann & P., Parycek (Eds.), Proceedings of the 7th International Conference for E-Democracy and Open Government (pp. 159-170). Krems, Austria.
2016

Wang, J., & Tang, Q. (2016). A Probabilistic View of Neighborhood-based Recommendation Methods. ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE.

Delerue Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers (pp. 347-363). Springer.

Rial, A. (2016, December). On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data. Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom).

Seo, H., Liu, Z., Groszschädl, J., & Kim, H. (2016). Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. Security and Communication Networks, 9(18), 5401-5411.

Pejo, B., & Tang, Q. (2016, November 03). Game-Theoretic Framework for Integrity Verification in Computation Outsourcing. Poster session presented at Decision and Game Theory for Security (GameSec), New York, United States of America.

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, November). Transparent Medical Data Systems. Journal of Medical Systems.

Rial, A., Danezis, G., & Kohlweiss, M. (2016, November). Privacy-preserving smart metering revisited. International Journal of Information Security.

Tang, Q., & Wang, J. (2016, November). Privacy-preserving Friendship-based Recommender Systems. IEEE Transactions on Dependable and Secure Computing.

Tabatabaei, M. (2016). GAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Jamroga, W. (Promotor), van der Torre, L., Teague, V., & Schneider, S.

Perez Urquidi, J. M. (2016). Attribute-Based Signatures with Traceability and Verifiable Controllable Linkability. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Lancrenon, J. (Promotor), Coron, J.-S., Chen, L., & Hao, F.

Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6(3), 229-238.

Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2016). Metrics for Transparency. Proceedings of DPM 2016 and QASA 2016.

Camenisch, J., Dubovitskaya, M., & Rial, A. (2016). UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. Advances in Cryptology – CRYPTO 2016 (pp. 208-239). Springer Berlin Heidelberg.

Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2016). A Parallel Cooperative Coevolutionary SMPSO Algorithm for Multi-objective Optimization. IEEE International Conference on High Performance Computing Simulation (HPCS) (pp. 713–720).

Liu, Z., Groszschädl, J., Li, L., & Xu, Q. (2016). Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. In J. K., Liu & R., Steinfeld (Eds.), Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (pp. 94-112). Springer Verlag.

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2016). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Transactions on Information Forensics and Security, 11(7), 1385-1397.

Huynen, J.-L. (2016). Socio-Technical Aspects of Security Analysis. Unpublished doctoral thesis, University of Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), Lenzini, G. (Promotor), & Koenig, V. (Promotor).

Pejo, B., Tang, Q., & Wang, H. (2016, June 27). Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. Paper presented at 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, United States of America.

Skrobot, M., Lancrenon, J., & Tang, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. ACNS 2016.

Teubner, D., Wesslein, A.-K., Roenne, P., Veith, M., Frings, C., & Paulus, M. (2016, June). Is a visuo-haptic differentiation of zebra mussel and quagga mussel based on a single external morphometric shell character possible? Aquatic Invasions.

Lancrenon, J. (2016). On Password-Authenticated Key Exchange Security Modeling. In F., Stajano, S., Mjolsnes, G., Jenkinson, & P., Thorsheim (Eds.), Technology and practice of passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Springer.

Perez Urquidi, J. M., Lancrenon, J., Khader, D., & Chen, L. (2016). Attribute-Based Signatures with Controllable Linkability. In M., Yung, J., Zhang, & Z., Yang (Eds.), Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (pp. 114-129). Springer.

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, March). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies.
Clark, J., Sarah, Ryan, P., Wallach, D., Brenner, M., & Rohloff, K. (Eds.). (2016). Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC. Barbados: Springer.

Creutzig, T., Hikida, Y., & Roenne, P. (2016). Correspondences between WZNW models and CFTs with W-algebra symmetry. JHEP, 02, 048.

De Caro, A.* , & Iovino, V.* . (2016). On the Power of Rewinding Simulators in Functional Encryption. Designs, Codes and Cryptography.
* These authors have contributed equally to this work.

De caro, A., Iovino, V., & O'Neill, A. (2016). Deniable Functional Encryption. Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (1, pp. 27). Springer.

Delerue Arriaga, A., Barbosa, M., & Farshim, P. (2016). Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. In O., Dunkelman & S. K., Sanadhya (Eds.), Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer.
Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. Eprint/Working paper retrieved from http://eprint.iacr.org/2016/975.

Giustolisi, R., Iovino, V., & Rønne, P. (2016). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Springer.
Hao, F., & Ryan, P. (Eds.). (2016). Real-World Electronic Voting: Design, Analysis and Deployment. Auerbach Publications.

Iovino, V., Tang, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology.

Jamroga, W., & Tabatabaei, M. (2016). Information Security as Strategic (In)effectivity. 12th International Workshop on Security and Trust Management (STM), 2016.

Jamroga, W., & Tabatabaei, M. (2016). Preventing Coercion in E-Voting: Be Open and Commit. Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID).

Roenne, P. (2016). JCJ with Improved Verifiability Guarantees. Paper presented at E-Vote-ID.
Ryan, P. (2016). Crypto Santa. The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer.
Ryan, P., Naccache, D., & Quisquater, J.-J. (Eds.). (2016). The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer.

Tabatabaei, M., Jamroga, W., & Ryan, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. The International Workshop on AI for Privacy and Security (PrAISe), 2016.
2015

Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318.

Atashpendar, A., Roscoe, B., & Ryan, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer.

Liu, Z. (2015). Lightweight Public-Key Cryptography for Wireless Sensor Nodes. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Coron, J.-S. (Promotor), Müller, V., Biryukov, A., Longa, P., & Naccache, D.

Wang, J., & Tang, Q. (2015, October). Recommender Systems and their Security Concerns. Paper presented at iacr.
Iovino, V., & Żebrowski, K. (2015, September 11). Mergeable Functional Encryption. Paper presented at 16th Italian Conference on Theoretical Computer Science (ICTCS), Firenze, Italy.

Chenal, M., & Tang, Q. (2015). Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. Information Security - 18th International Conference, ISC 2015.

Liu, Z., Seo, H., Roy, S. S., Groszschädl, J., Kim, H., & Verbauwhede, I. (2015). Efficient Ring-LWE Encryption on 8-bit AVR Processors. In T., Güneysu & H., Handschuh (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (pp. 663-682). Springer Verlag.

Skrobot, M., & Lancrenon, J. (2015). On the Provable Security of the Dragonfly Protocol. In J., Lopez & C. J., Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer.

Tang, Q., & Wang, J. (2015). Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security.

Kiraz, M. S., Genç, Z. A., & Kardaş, S. (2015). Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer. Security and Communication Networks, 8(18), 4123-4135.

Hikida, Y., & Roenne, P. B. (2015). Marginal deformations and the Higgs phenomenon in higher spin AdS3 holography. Journal of High Energy Physics, 7, 125-156.

Tang, Q., Ma, H., & Chen, X. (2015). Extend the Concept of Public Key Encryption with Delegated Search. Computer Journal, 58(4), 11.

Liu, Z., Seo, H., Hu, Z., Huang, X., & Groszschädl, J. (2015). Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. In F., Bao, S., Miller, J., Zhou, & G.-J., Ahn (Eds.), ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (pp. 145-153). ACM Press.

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT.

Laczny, C. C., Sternal, T., Plugaru, V., Gawron, P., Atashpendar, A., Margossian, H. H., Coronado, S., van der Maaten, L., Vlassis, N., & Wilmes, P. (2015, January 20). VizBin - an application for reference-independent visualization and human-augmented binning of metagenomic data. Microbiome.

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015.

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S., Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer.

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334.

Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A., T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer.

Giustolisi, R. (2015). Design and Analysis of Secure Exam Protocols. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Ryan, P. (Promotor), & Lenzini, G.

Giustolisi, R., Iovino, V., & Roenne, P. (2015). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptology ePrint Archive, 2015, 1119.

Iovino, V., & Żebrowski, K. (2015). Simulation-Based Secure Functional Encryption in the Random Oracle Model. Progress in Cryptology -- LATINCRYPT 2015 (pp. 19). Springer.

Jamroga, W., & Tabatabaei, M. (2015). Accumulative knowledge under bounded resources. Journal of Logic and Computation, 003.

Jamroga, W., & Tabatabaei, M. (2015). Strategic Noninterference. ICT Systems Security and Privacy Protection (pp. 67--81). Springer.

Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? Advances in Intelligent Systems and Computing. Springer.

Li, J., Sattar, S. A., Baig, M. M., Liu, J., Tang, Q., & Malin, B. (2015). Methods to Mitigate Risk of Composition Attack in Independent Data Publications. Medical Data Privacy Handbook 2015. Springer.

Roenne, P. B., Creutzig, T., & Hikida, Y. (2015). Higher spin AdS3 holography and superstring theory. Paper presented at String Math 2014 Edmonton, Alberta, Canada.

Ryan, P., Benaloh, J., Rivest, R., Stark, P., Teague, V., & Vora, P. (2015). End-to-end verifiability. arXiv preprint arXiv:1504.03778.

Ryan, P., Preneel, B., Rogaway, P., & Ryan, M. D. (2015). Privacy and Security in an Age of Surveillance.
2016

Ryan, P., Roenne, P., & Iovino, V. (2016). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105.
2015

Ryan, P., Schneider, S., & Teague, V. (2015). End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security and Privacy, 13(3), 59-62.

Tang, Q. (2015). Towards Forward Security Properties for PEKS and IBE. Information Security and Privacy - 20th Australasian Conference, ACISP 2015.
2014

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2014). Reverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors. In L. C. K., Hui, S., Qing, E., Shi, & S.-M., Yiu (Eds.), Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (pp. 158–175). Springer Verlag.

Seo, H., Liu, Z., Groszschädl, J., Choi, J., & Kim, H. (2014). Montgomery Modular Multiplication on ARM-NEON Revisited. In J., Kim & J., Lee (Eds.), Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Springer Verlag.

Yang, Y., Guan, Z., Liu, Z., & Chen, Z. (2014). Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. In E., Shi & S. M., Yiu (Eds.), Information and Communications Security. Springer.

Lancrenon, J. (2014). What Public Keys Can Do for Three-Party, Password-Authenticated Key Exchange. In Sokratis & I., Agudo (Eds.), Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (pp. 83-101). Springer-Verlag.

Seo, H., Liu, Z., Nogami, Y., Choi, J., & Kim, H. (2014). Improved Modular Multiplication for Optimal Prime Fields. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/19574.

Chen, X., Li, J., Ma, J., Tang, Q., & Lou, W. (2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2386-2396.

Joaquim, R. (2014, June 10). How to prove the validity of a complex ballot encryption to the voter and the public. Journal of Information Security and Applications.

Liu, Z., Wenger, E., & Groszschädl, J. (2014). MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. In I., Boureanu, P., Owezarski, & S., Vaudenay (Eds.), Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (pp. 361-379). Springer Verlag.

Cui, S., Liu, Z., Groszschädl, J., & Xu, Q. (2014). High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. In X., Huang & J., Zhou (Eds.), Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (pp. 202-216). Springer Verlag.

Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. IEEE 3rd International Conference on Serious Games and Applications in Healthcare.

Liu, Z., & Groszschädl, J. (2014). New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. In D., Pointcheval & D., Vergnaud (Eds.), Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (pp. 215-234). Springer Verlag.

Afshar, H., Creutzig, T., Grumiller, D., Hikida, Y., & Roenne, P. B. (2014). Unitary W-algebras and three-dimensional higher spin gravities with spin one symmetry. Journal of High Energy Physics.

Aouada, D., & Khader, D. (2014). SPN2: Single-Sided Privacy Preserving Nearest Neighbor and its Application to Face Recognition. 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14).
Atashpendar, A. (2014). BinSeqPy.
Atashpendar, A. (2014). QKD Simulator.

Bella, G., Curzon, P., Giustolisi, R., & Lenzini, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden.

Bella, G., Giustolisi, R., & Lenzini, G. (2014). Secure exams despite malicious management. Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014.

Bosch, Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P., & Jonker, W. (2014). Distributed Searchable Symmetric Encryption. PST2014 International Conference on Privacy, Security and Trust.

Bulling, N., & Jamroga, W. (2014). Comparing variants of strategic ability: how uncertainty and memory influence general properties of games. Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems.

Bulling, N., & Jamroga, W. (2014). Comparing variants of strategic ability: how uncertainty and memory influence general properties of games. proceedings of Autonomous Agents and Multi-agent Systems (pp. 474-518).

Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S., & Tang, Q. (2014). Efficient Algorithms for Secure Outsourcing of Bilinear Pairings. Theoretical Computer Science.

Chenal, M., & Tang, Q. (2014). On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes. Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014.

Creutzig, T., Hikida, Y., & Roenne, P. B. (2014). Higher spin AdS$_3$ holography with extended supersymmetry. Journal of High Energy Physics, 1410, 163.

Culnane, C., Ryan, P., Schneider, S., & Teague, V. (2014). vVote: a Verifiable Voting System. Jets.

Delerue Arriaga, A., Tang, Q., & Ryan, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014.

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014.

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science.

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science.

Fotiadis, G., & Konstantinou, E. (2014). More Sparse Families of Pairing-Friendly Elliptic Curves. International Conference on Cryptology and Network Security, Heraklion 22-24 October 2014. Springer.

Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science.

Khader, D., El Kaafarani, A., & Ghadafi, E. (2014). Decentralized Traceable Attribute-Based Signatures. LNCS.

Kordy, B., Schweitzer, P., & Pouly, M. (2014). A Probabilistic Framework for Security Scenarios with Dependent Actions. The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy.

Preneel, B., Rogaway, P., Ryan, M. D., & Ryan, P. (2014). Privacy and Security in an Age of Surveillance. Dagstuhl Reports, 4(9), 106-123.

Rodrigues, J. D., Natarajan, S., Ferreira, A., Carrera, E., Cinefra, M., & Bordas, S. (2014). Analysis of composite plates through cell-based smoothed finite element and 4-noded mixed interpolation of tensorial components techniques. Computers and Structures, 135, 83-87.

Ryan, P., Phatak, D. S., Tang, Q., Smith, W. D., Sherman, A. T., & Kalpakis, K. (2014). DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptology ePrint Archive.

Tang, Q. (2014). From Ephemerizer to Timed-Ephemerizer - Achieve Assured Lifecycle Enforcement for Sensitive Data. Computer Journal.

Tang, Q. (2014). Nothing is for Free: Security in Searching Shared & Encrypted Data. IEEE Transactions on Information Forensics and Security.
2013

Culnane, C., Heather, J., Joaquim, R., Ryan, P., Schneider, S., & Teague, V. (2013). Faster Print on Demand for Prêt à Voter. Journal of Election Technology and Systems, 2(1).

Seo, H., Liu, Z., Choi, J., & Kim, K. (2013). Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. The 14th International Conference on Cryptology in India -- INDOCRYPT 2013, 8250, 227-243.

Liu, Z., Groszschädl, J., & Wong, D. S. (2013). Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. In D., Lin, S., Xu, & M., Yung (Eds.), Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (pp. 217-235). Springer Verlag.

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2013). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. In S., Qing, J., Zhou, & D., Liu (Eds.), Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (pp. 302-317). Springer Verlag.
Seo, H., Liu, Z., Park, T., Kim, H., Lee, Y., Choi, J., & Kim, H. (2013). Parallel Implementation of LEA. Eprint/Working paper retrieved from http://www.icisc.org/icisc13/asp/04-1.html.

Zhao, X., Guo, S., Zhang, F., Wang, T., Shi, Z., Liu, Z., & Gallais, J.-F. C. C. O. (2013). A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES. Computers and Security, 39, 173-189.

Jamroga, W., & Tabatabaei, M. (2013). Accumulative Knowledge Under Bounded Resources. Computational Logic in Multi-Agent Systems (pp. 17). Berlin Heidelberg: Springer.

Khader, D., Ryan, P., & Tang, Q. (2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1(1), 62-81.

Seo, H., Liu, Z., Kim, H., Park, T., Lee, Y., & Kim, H. (2013, August). Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Sensors.

Ferreira, A. (2013, July). Log analysis of human computer interactions regarding Break The Glass accesses to genetic reports. Paper presented at 15th International Conference on Enterprise Information Systems.

Chu, D., Groszschädl, J., Liu, Z., Müller, V., & Zhang, Y. (2013). Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. In K., Chen, Q., Xie, W., Qiu, S., Xu, & Y., Zhao (Eds.), Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (pp. 39-44). ACM Press.

Ferreira, A., Giustolisi, R., Huynen, J.-L., & Lenzini, G. (2013, April 12). On Tools for Socio-Technical Security Analysis. Paper presented at Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg.

Tabatabaei, M., Jamroga, W., & Ryan, P. (2013, March 17). Preventing Coercion in E-Voting: Be Open and Commit. Paper presented at 1st Workshop on Hot Issues in Security Principles and Trust.

Bella, G., Giustolisi, R., & Lenzini, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. PST (pp. 309-316).

Bella, G., Giustolisi, R., & Lenzini, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. Trust Management VII (pp. 281-288).

Creutzig, T., Hikida, Y., & Roenne, P. B. (2013). N=1 supersymmetric higher spin holography on AdS3. Journal of High Energy Physics, 2013(2).

Creutzig, T., Hikida, Y., & Roenne, P. B. (2013). Three point functions in higher spin AdS3 supergravity. Journal of High Energy Physics, 2013(1).

Creutzig, T., Hikida, Y., & Roenne, P. B. (2013). Extended higher spin holography and Grassmannian models. Journal of High Energy Physics.

Creutzig, T., Hikida, Y., & Roenne, P. B. (2013). Higher spin AdS$_3$ supergravity and its CFT dual. International Journal of Modern Physics Conference Series.

De caro, A., Iovino, V., Jain, A., O'Neill, A., Paneth, O., & Persiano, G. (2013). On the Achievability of Simulation-Based Security for Functional Encryption. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Springer.

Ferreira, A., Giustolisi, R., Huynen, J.-L., Koenig, V., & Lenzini, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom.

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143.

Fotiadis, G., & Konstantinou, E. (2013). On the Efficient Generation of Generalized MNT Elliptic Curves. 5th International Conference on Algebraic Informatics, Porquerolles 3-6 September 2013 (pp. 147-159). Berlin: Springer.

Giustolisi, R., Lenzini, G., & Bella, G. (2013). What Security for Electronic Exams? 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013.

Goranko, V., Jamroga, W., & Turrini, P. (2013). Strategic games and truly playable effectivity functions. Autonomous Agents & Multi-Agent Systems, 26(2), 288-314.

Jamroga, W., Melissen, M., & Schnoor, H. (2013). Incentives and Rationality in Security of Interaction Protocols. PRIMA 2013: Principles and Practice of Multi-Agent Systems. Proceedings.

Joaquim, R., Ferreira, P., & Ribeiro, C. (2013). EVIV: An end-to-end verifiable Internet voting system. Computers and Security, 32(0), 170 - 191.

Khader, D., McCall, R., & Lopez Becerra, J. M. (2013). Studying Boardroom E-Voting Schemes: Usability and Trust (TR-SnT-2013-3). SnT.
Lancrenon, J., Khader, D., Ryan, P., & Hao, F. (2013). Password-based Authenticated Key Establishment Protocols. Computer And Information Security Handbook (pp. 300-350). Elsevier.

Natarajan, S., Ferreira, A., Bordas, S., Carrera, E., & Cinefra, M. (2013). Analysis of composite plates by a unified formulation-cell based smoothed finite element method and field consistent elements. Composite Structures, 105, 75-81.

Orlando, L.* , Ginolhac, A.* , Zhang, G., Froese, D., Albrechtsen, A., Stiller, M., Schubert, M., Cappellini, E., Petersen, B., Moltke, I., Johnson, P. L. F., Fumagalli, M., Vilstrup, J. T., Raghavan, M., Korneliussen, T., Malaspinas, A.-S., Vogt, J., Szklarczyk, D., Kelstrup, C. D., Vinther, J., Dolocan, A., Stenderup, J., Velazquez, A. M. V., Cahill, J., Rasmussen, M., Wang, X., Min, J., Zazula, G. D., Seguin-Orlando, A., Mortensen, C., Magnussen, K., Thompson, J. F., Weinstock, J., Gregersen, K., Roed, K. H., Eisenmann, V., Rubin, C. J., Miller, D. C., Antczak, D. F., Bertelsen, M. F., Brunak, S., Al-Rasheid, K. A. S., Ryder, O., Andersson, L., Mundy, J., Krogh, A., Gilbert, M. T. P., Kjaer, K., Sicheritz-Ponten, T., Jensen, L. J., Olsen, J. V., Hofreiter, M., Nielsen, R., Shapiro, B., Wang, J., & Willerslev, E. (2013). Recalibrating Equus evolution using the genome sequence of an early Middle Pleistocene horse. Nature, 499(7456), 74-8.
* These authors have contributed equally to this work.

Ryan, P., Benaloh, J., & Teague, V. (2013). Verifiable postal voting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

Ryan, P., & Christianson, B. (2013). Enhancements to prepare-and-measure based QKD protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 123-133). Springer Verlag.

Ryan, P., Demirel, D., Henning, M., van de Graaf, J., & Buchmann, J. (2013). Prêt à Voter providing everlasting privacy. Lecture Notes in Computer Science, 165-220.

Ryan, P., Grewal, G. S., Ryan, M. D., & Bursuc, S. (2013). Caveat Coercitor: coercion-evidence in electronic voting. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (pp. 367-381).

Ryan, P., Peacock, T., Schneider, S., & Xia, Z. (2013). Verifiable Voting Systems. Computer and Information Security Handbook (pp. 1103-1125). Elsevier Inc.

Ryan, P., Pouly, M., & Kohlas, J. (2013). Generalized Information Theory for Hints. International Journal of Approximate Reasoning, 54(1), 228-251.

Ryan, P., Schneider, S., Xia, Z., Llewellyn, M., Heather, J., & Culnane, C. (2013). Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. 53 USENIX Journal of Election Technology and Systems (JETS), 1(1), 53-61.

Ryan, P., Teague, V., Schneider, S., Joaquim, R., Heather, J., & Culnane, C. (2013). Faster print on demand for Prêt à Voter. USENIX Journal of Election Technology and Systems (JETS), 2(1).

Tang, Q. (2013). Search in Encrypted Data: Theoretical Models and Practical Applications. Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 84-108). IGI.

Tang, Q. (2013). Towards a privacy-preserving solution for OSNs. In R., Sandhu, J., Lopez, & X., Huang (Eds.), Towards a privacy-preserving solution for OSNs.

Tang, Q., & Chen, X. (2013). Towards asymmetric searchable encryption with message recovery and flexible search authorization. Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (pp. 253-264).
2012
Wu, Y. (2012). Between Argument and Conclusion - Argument-based Approaches to Discussion, Inference and Uncertainty. Unpublished doctoral thesis, University of Luxembourg, Luxembourg, Luxembourg.
Jury: Van Der Torre, L. (Promotor).

Atashpendar, A., Kirsch, L., Botev, J., & Rothkugel, S. (2012). A Native Approach to Semantics and Inference in Fine-Grained Documents. Proceedings of the 2nd Joint International Semantic Technology Conference (JIST).

Burton, C. B., Culnane, C., Heather, J., Peacock, T., Ryan, P., Schneider, S., Teague, V., Wen, R., Xia, Z., & Srinivasan, S. (2012). A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. EVOTE 2012, 1-10.

Delerue Arriaga, A., Barbosa, M., & Farshim, P. (2012). On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. Applied Cryptography and Network Security, Singapore 26-29 June, 2012.
Goranko, V., & Jamroga, W. (Eds.). (2012). Proceedings of the 5th Workshop on Logical Aspects of Multi-Agent Systems LAMAS'2012. IFAAMAS.

Goranko, V., & Jamroga, W. (2012). State and Path Effectivity Models for Logics of Multi-Player Games. Proceedings of AAMAS 2012 (pp. 1123-1130). Springer.

Jamroga, W. (2012). Concepts, Agents, and Coalitions in Alternating Time. Proceedings of ECAI 2012 (pp. 438-443).
Jamroga, W., & Goranko, V. (Eds.). (2012). LAMAS 2012 Proceedings of the 5rd Workshop on Logical Aspects of Multi-Agent Systems. IFAAMAS.

Jamroga, W., Mauw, S., & Melissen, M. (2012). Fairness in Non-repudiation Protocols. Proceedings of STM 2011 (pp. 122-139). Springer.

Jamroga, W., & Penczek, W. (2012). Specification and Verification of Multi-Agent Systems. Lectures on Logic and Computation (pp. 210-263). Springer.

Joaquim, R., & Ribeiro, C. (2012). An Efficient and Highly Sound Voter Verification Technique and Its Implementation. In A., Kiayias & H., Lipmaa (Eds.), E-Voting and Identity (pp. 104-121). Springer Berlin Heidelberg.

Khader, D., Smyth, B., Ryan, P., & Hao, F. (2012). A Fair and Robust Voting System by Broadcast. Lecture Notes in Informatics, 285-299.

Ryan, P., & Coles-Kemp, L. (2012). Foreword from the Programme Chairs-STAST 2012. Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on.

Ryan, P., Schneider, S., Peacock, T., Heather, J., Srinivasan, S., Teague, V., Xia, Z., Wen, R., Culnane, C., & Burton, C. (2012). Using Prêt à Voter in Victorian State Elections. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections.

Seredynski, M., Danoy, G., Tabatabaei, M., Bouvry, P., & Pigné, Y. (2012). Generation of Realistic Mobility for VANETs Using Genetic Algorithms. Proceedings of the IEEE Congress on Evolutionary Computation, 1-8.

Slavkovik, M., & Jamroga, W. (2012). Distance-Based Rules for Weighted Judgment Aggregation (Extended Abstract). Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS2012, 1405-1406.
2011
Pouly, M., & Kohlas, J. (2011). Generic Inference A Unifying Theory for Automated Reasoning. John Wiley & Sons.

Pouly, M., Schneuwly, C., & Kohlas, J. (2011). Generic Local Computation. Luxembourg, Luxembourg: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg.

Bella, G., Giustolisi, R., & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers and Security, 30(8), 705 - 718.

Bulling, N., & Jamroga, W. (2011). Alternating Epistemic Mu-Calculus. Proceedings of IJCAI-11 (pp. 109–114).
Coles-Kemp, L., Lenzini, G., Ryan, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE.

Goranko, V., Jamroga, W., & Turrini, P. (2011). Strategic Games and Truly Playable Effectivity Functions. Proceedings of AAMAS2011 (pp. 727–734).

Jamroga, W., & Bulling, N. (2011). Comparing Variants of Strategic Ability. Proceedings of IJCAI-11 (pp. 252–257).

Jamroga, W., & Melissen, M. (2011). Doubtful Deviations and Farsighted Play. Progress in Artificial Intelligence, Proceedings of the 15th Portuguese Conference on Artificial Intelligence (pp. 506–520). Springer.

Kordy, B., Pouly, M., & Schweitzer, P. (2011). Computational Aspects of Attack-Defense Trees. Security and Intelligent Information Systems - International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (pp. 103-116). Springer.

Kramer, S., & Ryan, P. (2011). A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (pp. 9 - 21). IEEE.

Novak, P., & Jamroga, W. (2011). Agents, Actions and Goals in Dynamic Environments. Proceedings of IJCAI-11 (pp. 313–318).
Pouly, M. (2011). Generalized Information Theory based on the Theory of Hints. In W., Liu (Ed.), Symbolic and Quantitative Approaches to Reasoning with Uncertainty (pp. 299-313). Springer.
Pouly, M. (2011). Generic Solution Construction in Valuation-Based Systems. In C., Butz & P., Lingras (Eds.), Advances in Artificial Intelligence (pp. 335 - 346). Springer.

Slavkovik, M., & Jamroga, W. (2011). Distance-based Judgment Aggregation of Three-valued Judgments with Weights. Proceedings of the IJCAI Workshop on Social Choice and Artificial Intelligence (pp. 81–87).
2010

Kambourakis, G., Konstantinou, E., Douma, A., Anagnostopoulos, M., & Fotiadis, G. (2010). Efficient Certification Path Discovery for MANET. EURASIP Journal on Wireless Communications and Networking, 2010.

Bulling, N., Dix, J., & Jamroga, W. (2010). Model Checking Logics of Strategic Ability: Complexity. In M., Dastani, K., Hindriks, & J.-J., Meyer (Eds.), Specification and Verification of Multi-Agent Systems (pp. 125–159). Springer.

Bulling, N., & Jamroga, W. (2010). Verifying Agents with Memory Is Harder than It Seemed. AI Communications, 23, 380–403.

Bulling, N., & Jamroga, W. (2010). Verifying Agents with Memory Is Harder than It Seemed. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS (pp. 633–640).

Dastani, M., & Jamroga, W. (2010). Reasoning about Strategies of Multi-Agent Programs. Proceedings of AAMAS2010 (pp. 625–632).

Goranko, V., Jamroga, W., & Turrini, P. (2010). Strategic Games and Truly Playable Effectivity Functions. Proceedings of EUMAS2010.

Jamroga, W., & Bulling, N. (2010). Comparing Variants of Strategic Ability. Proceedings of EUMAS2010.

Joaquim, R., Ribeiro, C., & Ferreira, P. (2010). Improving Remote Voting Security with CodeVoting. In D., Chaum, M., Jakobsson, R., Rivest, P. A., Ryan, J., Benaloh, M., Kutylowski, & B., Adida (Eds.), Towards Trustworthy Elections (pp. 310-329). Springer Berlin Heidelberg.

Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. Proc. 18th Security Protocols Workshop. Springer-Verlag.

Seylan, I., & Jamroga, W. (2010). Coalition Description Logic for Individuals. Electronic Notes in Theoretical Computer Science, 262, 231–248.

Xia, Z., Culnane, C., Heather, J., Jonker, H., Ryan, P., Schneider, S., & Srinivasan, S. (2010). Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (pp. 98–114). Springer-Verlag.
2009

Bulling, N., & Jamroga, W. (2009). Rational Play and Rational Beliefs under Uncertainty. Proceedings of AAMAS'09, 257–264.

Bulling, N., & Jamroga, W. (2009). What agents can probably enforce. Fundamenta Informaticae, 81-96.

Jamroga, W. (2009). Easy Yet Hard: Model Checking Strategies of Agents. Computational Logic in Multi-Agent Systems: Proceedings of CLIMA IX (pp. 1–12).

Joaquim, R., Ribeiro, C., & Ferreira, P. (2009). VeryVote: A Voter Verifiable Code Voting System. In P. A., Ryan & B., Schoenmakers (Eds.), E-Voting and Identity (pp. 106-121). Springer Berlin Heidelberg.

Novák, P., & Jamroga, W. (2009). Code Patterns for Agent Oriented Programming. Proceedings of AAMAS'09, 105–112.

Seylan, I., & Jamroga, W. (2009). Description Logic for Coalitions. Proceedings of AAMAS'09, 425–432.