John Kleinig, Peter Mameli, Seumas Miller, Douglas Salane, Adina Schwartz (2011), Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States, ANU Press.
M Merhi, JC Hernandez-Castro, P Peris Lopez (2011), Studying the pseudo random number generator of a low-cost RFID tag, A Georgiadis, MM Tentzeris (Eds.), In Proceedings of the IEEE International Conference on RFID-Technologies and Applications 2011 p.381-385, IEEE.
A Mitrokotsa, M Rieback, AS Tanebaum (2010), Classifying RFID attacks and defenses, In Information Systems Frontiers: a journal of research and innovation Volume 12 p.491-505.
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Esther Palomar, Jan C.A. Van Der Lubbe (2010), Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security, In RFID 2010 p.45-52, IEEE.
Pedro Peris-Lopez, Enrique San Millan, Jan C.A. Van Der Lubbe, Luis A. Entrena (2010), Cryptographically secure pseudo-random bit generator for RFID tags, In 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010.
B. Pourebrahimi, J.C.A. Van Der Lubbe, Georg Dietz (2010), Digital analysis of papers for the authentication and dating of art, In Proceedings of the 12th IASTED International Conference on Signal and Image Processing, SIP 2010 p.93-100.
Z Erkin, MRT Beye, PJM Veugen (2010), Efficiently computing private recommendations, S.N. (Eds.), In Proceedings of ASCI 2010 p.1-8, Advanced School for Computing and Imaging.
Z Erkin, M Beye, PJM Veugen, RL Lagendijk (2010), Privacy enhanced recommender system, JH Weber J. Gosseling (Eds.), In Proceedings of the thirty-first symposium on Information Theory in the Benelux p.35-43, Werkgemeenschap voor Informatie- en Communicatietheorie.
A Mitrokotsa, N Komninos, C Douligeris (2010), Protection of an intrusion detection engine with watermarking in ad hoc networks, In International Journal of Network Security Volume 10 p.93-106.
A Mitrokotsa, C Dimitrakakis, P Peris-Lopez, JC Hernandez-Castro (2010), Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels, In IEEE Communications Letters Volume 14 p.1-3.