Z Erkin (2010), Secure signal processing: Privacy preserving cryptographic protocols for multimedia, PhD Thesis Delft University of Technology.

P Peris Lopez, JC Hernadez-Castro, JME Tapiador, E San Millan, JCA van der Lubbe (2010), Security flaws in an efficient pseudo-random number generator for low-power environments, In Lecture Notes in Computer Science Volume 42 p.25-35.

M.J.G. van Eeten, JM Bauer, H. Asghari, S. Tabatabaie (2010), The Role of Internet Service Providers in Botnet Mitigration, OECD Publishing.

A Mitrokotsa, C Douligeris (2009), Integrated RFID and sensor networks:architectures and applications, L.T. Yang J. Chen Y. Zhang (Eds.), In RFID and Sensor Networks: Architectures, Protocols, Security and Integrations p.511-537, CRC Press.

A Arnes, J Aguado Bombin, E Boschi, S Buchegger, R Benito Cortinas, F Gaudino, G Hobgen, T Karaginiannis, C Manifavas, A Mitrokotsa, I Naumann, N Nikiforakis, P Papadimitratos, G Roussos, K Tsakona (2009), Mobile identity management, European Network and Information Security Agency (ENISA).

Z Erkin, M Franz, J Guajardo, S Katzenbeisser, RL Lagendijk, T Toft (2009), Privacy-preserving face recognition, In Lecture Notes in Computer Science Volume 5672/2009 p.235-255.

Z Erkin, PJM Veugen, T Toft, RL Lagendijk (2009), Privacy-preserving user clustering in a social network, SN (Eds.), In Proceedings of the IEEE International Workshop on Information Forensics and Security, p.96-100, IEEE.

T Bianchi, PJM Veugen, A Piva, M Barni (2009), Processing in the encrypted domain using a composite signal representation:pros and cons, SN (Eds.), In Proceedings of the 2009 first IEEE international workshop on information forensics and security p.176-181, IEEE.

C Dimitrakakis, A Mitrokotsa (2009), Statistical decision making for authentication and intrusion detection, M. Kantardzic V. Palade M. Arif Wani (Eds.), In Proceedings of the eight international conference on machine learning and applications p.409-414, IEEE.

J.-H. Hoepman, PJM Veugen (2009), Threats and vulnerabilities of RFID and beyond, P. Kitsos Y. Zhang (Eds.), In Security in RFID and sensor networks (wireless networks and mobile communications) p.469-489, CRC Press.