AM Monteiro OliveiraCortez, V van der Leest, R Maes, GJ Schrijen, S Hamdioui (2013), Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs, s.n. (Eds.), In IEEE International symposium on hardware-oriented security and trust p.35-40.

Y Koc, ME Warnier, RE Kooij, FM Brazier (2013), An entropy-based metric to quantify the robustness of power grids against cascading failures, In Safety Science Volume 59 p.126-134.

NSM Zeilemaker, Z Erkin, P Palmieri, J. Pouwelse (2013), Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks, In Proceedings of the 2013 IEEE international workshop on information forensics and security (WIFS2013) p.79-84.

D Kononchuk, Z Erkin, JCA van der Lubbe, RL Lagendijk (2013), Building blocks for privacy-preserving recommender systems in a dynamic setting, S Pollin, L van der Perre (Eds.), In Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux p.37-44.

H Asghari, MJG van Eeten, JM Bauer, M Mueller (2013), Deep packet inspection: Effects of regulation on its deployment by internet providers Volume Working papers series.

H Asghari, B Kuerbis, ML Mueller (2013), Dimensioning the elephant: an empirical analysis of the IPv4 number market, In Info: The journal of policy, regulation and strategy for telecommunications, information and media Volume 15 p.6-18.

RL Lagendijk, Z Erkin, M Barni (2013), Encrypted signal processing for privacy protection, In IEEE Signal Processing Magazine Volume 30 p.82-105.

A Noroozian, MM de Weerdt, C Witteveen (2013), Incentivizing cooperation in P2P file sharing: Indirect interaction as an incentive to seed, L Cao, Y Zeng, AL Symeonidis, VI Gorodetsky, PS Yu, MP Singh (Eds.), In Proceedings - 8th International Workshop on Agents and Data Mining Interaction p.36-50.

H Asghari, MJG van Eeten, M Mueller (2013), Internet Measurements and Public Policy: Mind the Gap, C Kanich (Eds.), In 6th workshop on cyber security experimentation and test, CSET '13 p.1-26.

C Doerr, N Blenn, PFA Van Mieghem (2013), Lognormal infection times of online information spread, In PLoS ONE Volume 8 p.1-6.