Nitin Chiluka, Nazareno Andrade, Johan Pouwelse, Henk Sips (2015), Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn, In ASIA CCS'15 p.507-518, Association for Computing Machinery (ACM).
A Arnbak, H Asghari, MJG van Eeten (2014), Assessing legal and technical solutions to secure HTTPS, In ACM Queue: tomorrow's computing today Volume 12 p.1-15.
PJM Veugen (2014), Encrypted integer division and secure comparison, In International Journal of Applied Cryptography Volume 3 p.166-180.
Z Erkin, PJM Veugen (2014), Privacy enhanced personal services for smart grids, B Defend, K Kursawe (Eds.), In Proceedings of the 2nd Workshop on Smart Energy Grid Security p.7-12, Association for Computing Machinery (ACM).
Z Erkin, J Li, APOS Vermeeren, H de Ridder (2014), Privacy-preserving emotion detection for crowd management, D Slezak, G Schaefer, ST Vuong, YS Kim (Eds.), In Active Media Technology - Proceedings of the 10th International Conference AMT 2014 p.359-370, Springer.
A Arnbak, H Asghari, MJG van Eeten, NANM van Eijk (2014), Security collapse in the HTTPS market, In Communications of the ACM Volume 57 p.47-55.
Y Koc, ME Warnier, R.E. Kooij, FM Brazier (2014), Structural vulnerability assessment of electric power grids, In Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control, ICNSC 2014 p.386-391, IEEE.
Y Koc, ME Warnier, PFA Van Mieghem, RE Kooij, FM Brazier (2014), The impact of the topology on cascading failures in a power grid model, In Physica A: Statistical Mechanics and its Applications Volume 402 p.169-179.
M Capota, JA Pouwelse, DHJ Epema (2014), Towards a peer-to-peer bandwidth marketplace, M Chatterjee, JN Cao, K Kothepalli, S Rajsbaum (Eds.), In Distributed Computing & Networking - Proceedings 15th International Conference on Distributed Computing and Networking (ICDCN 2014) p.302-316, Springer.
Z Erkin, C Doerr, H Dantas, R Hallie, G van der Bij (2014), eFuzz: a fuzzer for DLMS/COSEM electricity meters, K Kursawe, B Defend (Eds.), In Proceedings 2nd Workshop on Smart Energy Grid Security p.31-38, Association for Computing Machinery (ACM).