Z Erkin, JR Troncoso-Pastoriza, RL Lagendijk, F Pérez-González (2013), Privacy-preserving data aggregation in smart metering systems: an overview, In IEEE Signal Processing Magazine Volume 30 p.75-86.

Z Erkin, PJM Veugen, T Toft, RL Lagendijk (2013), Privacy-preserving distributed clustering, In Eurasip Journal on Information Security Volume 2013 p.1-15.

RC Hendriks, Z Erkin, T Gerkmann (2013), Privacy-preserving distributed speech enhancement for wireless sensor networks by processing in the encrypted domain, SN (Eds.), In 2013 International Conference on Acoustic, Speech and Signal Processing-ICASSP p.7005-7009, IEEE.

Z Erkin, PJM Veugen, RL Lagendijk (2013), Privacy-preserving recommender systems in dynamic environments, T Kalker, J Huang (Eds.), In Proceedings of the 2013 IEEE Workshop on Information Forensics and Security p.61-66, IEEE.

D Kononchuk, Z Erkin, JCA van der Lubbe, RL Lagendijk (2013), Privacy-preserving user data oriented services for groups with dynamic participation, J Crampton, S Jajodia, K Mayes (Eds.), In Computer Security - Proceedings 18th European Symposium on Research in Computer Security p.418-442, Springer.

PJM Veugen (2013), Secure processing offload in recombining media segments for mobile access, S Pollin, L van der Perre, A Stas (Eds.), In Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux p.9-16, WIC.

H Asghari, MJG van Eeten, AM Arnbak, NANM van Eijk (2013), Security economics in the HTTPS value chain, Social sience research network Volume Working papers series.

M Janic, PJM Veugen, JP Wijbenga (2013), Transparency enhancing tools (TETs): an overview, G Bella, G Lenzini (Eds.), In Proceedings of the 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST) p.18-25, IEEE.

Amiya K. Maji, Fahad A. Arshad, Saurabh Bagchi, Jan S. Rellermeyer (2012), An empirical study of the robustness of Inter-component Communication in Android, In 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012 p.1-12.

MRT Beye, PJM Veugen (2012), Anonymity for key-trees with adaptive adversaries, In Lecture Notes in Computer Science Volume 96 p.409-425.