Z Erkin, MRT Beye, PJM Veugen, RL Lagendijk (2012), Privacy-preserving content-based recommender system, In Proceedings of the 14th ACM Workshop on Multimedia and Security p.77-84, Association for Computing Machinery (ACM).

Z Erkin, G Tsudik (2012), Private computation of spatial and temporal power consumption with smart meters, In Lecture Notes in Computer Science Volume 7341 p.561-577.

H Asghari, MJG van Eeten, M Mueller (2012), Unraveling the economic and political drivers of deep packet inspection Volume Working papers series.

JP Aumasson, A Mitrokotsa, P Peris Lopez (2011), A Note on a privacy-preserving distance-bounding protocol, In Lecture Notes in Computer Science Volume 7043 p.78-92.

Pedro Peris-Lopez, Agustin Orfila, Aikaterini Mitrokotsa, Jan C A van der Lubbe (2011), A comprehensive RFID solution to enhance inpatient medication safety, In International Journal of Medical Informatics Volume 80 p.13-24.

M Naser, P Peris Lopez, R Budiarto (2011), A note on the security of PAP, In Computer Communications Volume 34 p.2248-2249.

P Peris Lopez, A Orfila, E Palomar, JC Hernandez-Castro (2011), A secure distance-based RFID identification protocol with an off-line back-end database, In Personal and Ubiquitous Computing p.1-15.

H Martin, E San Milan, E Entrena, P Peris Lopez, JC Hernandez Castro (2011), AKARI-X: A pseudorandom number generator for secure lightweight systems, M Nicolaidis, A Paschalis, D Gizopoulos, X Vera (Eds.), In Proceedings of the IEEE 17th International On-Line Testing Symposium (IOLTS 2011) p.228-233.

C Doerr, S Tang, N Blenn, PFA van Mieghem (2011), Are friends overrated? A study for the social aggregator Digg.com, J Domingo-Pascual, P Manzoni, S Palazzo, A Pont, C Scoglio (Eds.), In IFIP Networking 2011 p.314-327.

JR Heersmink, MJ van den Hoven, N.J. van Eck, J van den Berg (2011), Bibliometric mapping of computer and information ethics, In Ethics and Information Technology Volume open acces p.241-249.