Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter (2014), A Survey of Provably Secure Searchable Encryption, In ACM Computing Surveys: the survey and tutorial journal of the ACM Volume 47 p.1-51.

C Doerr, FA Kuipers (2014), All quiet on the Internet front?, In IEEE Communications Magazine Volume 52 p.46-51.

MR Cayford, C van Gulijk, PHAJM van Gelder (2014), All swept up: an initial classification of NSA surveillance technology, Marek Mlynczak, Tomasz Nowakowski, Anna Jodejko-Petruczuk, Sylwia Werbinska-Wojciechowska (Eds.), In Safety and reliability: Methodology and applications, Proceedings of the European Safety and Reliability Conference p.643-650, Taylor & Francis.

A Arnbak, H Asghari, MJG van Eeten (2014), Assessing legal and technical solutions to secure HTTPS, In ACM Queue: tomorrow's computing today Volume 12 p.1-15.

N Blenn (2014), Content propagation in online social networks, PhD Thesis Delft University of Technology.

C van Gulijk, S Sillem, MR Cayford (2014), Deliverable 3.8: Report combining results of all effectiveness research, Delft University of Technology Volume SURVEILLE FP7-SEC-2011-284725.

Shinn-Shyan Wu, Chen-Ching Liu, Alexandru Stefanov (2014), Distributed Specification-Based Firewalls for Power Grid Substations, In IEEE PES Innovative Smart Grid Technologies (ISGT-Europe) p.1-6, IEEE.

PJM Veugen (2014), Encrypted integer division and secure comparison, In International Journal of Applied Cryptography Volume 3 p.166-180.

S Hamdioui, G. di Natale, G van Battum, J-L Danger, F Smailbegovic, M Tehranipoor (2014), Hacking and protecting IC hardware, W Nebel, G Fettweis (Eds.), In Proceedings of the 2014 International Conference on Design, Automation & Test in Europe p.1-7, EDAA.

NLM van Adrichem, C Doerr, FA Kuipers (2014), OpenNetMon: network monitoring in openflow software-defined networks, J Janusz Filipiak (Eds.), In Proceedings NOMS p.1-8, IEEE.