D Kononchuk, Z Erkin, JCA van der Lubbe, RL Lagendijk (2013), Privacy-preserving user data oriented services for groups with dynamic participation, J Crampton, S Jajodia, K Mayes (Eds.), In Computer Security - Proceedings 18th European Symposium on Research in Computer Security p.418-442, Springer.
PJM Veugen (2013), Secure processing offload in recombining media segments for mobile access, S Pollin, L van der Perre, A Stas (Eds.), In Proceedings of the 34th WIC Symposium on Information Theory in the Benelux, 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux p.9-16, WIC.
H Asghari, MJG van Eeten, AM Arnbak, NANM van Eijk (2013), Security economics in the HTTPS value chain, Social sience research network Volume Working papers series.
W Pieters, T Dimkov, D Pavlovic (2013), Security policy alignment : a formal approach, In IEEE Systems Journal Volume 7 p.275-287.
Sebastian Erdweg, T van der Storm, M. Völter, M Boersma, R Bosman, WR Cook, A Gerritsen, A Hulshout, S Kelly, A Loh, GDP Konat, PJ Molina, M Palatnik, R Pohjonen, E Schindler, K Schindler, R Solmi, VA Vergu, E Visser, K van der Vlist, GH Wachsmuth, J van der Woning (2013), The state of the art in language workbenches: Conclusions from the language workbench challenge, M Erwig, R Paige, E van Wyk (Eds.), In Software Language Engineering - Proceedings 6th International Conference SLE 2013 p.197-217, Springer.
M Janic, PJM Veugen, JP Wijbenga (2013), Transparency enhancing tools (TETs): an overview, G Bella, G Lenzini (Eds.), In Proceedings of the 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST) p.18-25, IEEE.
D Liu, N Blenn, PFA Van Mieghem (2012), A social network model exhibiting tunable overlapping community structure, H Ali, Y Shi, D Khazanchi et al (Eds.), In Proceedings of the 12th International Conference on Computational Science p.1400-1409, Elsevier.
Amiya K. Maji, Fahad A. Arshad, Saurabh Bagchi, Jan S. Rellermeyer (2012), An empirical study of the robustness of Inter-component Communication in Android, In 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012 p.1-12.
MRT Beye, PJM Veugen (2012), Anonymity for key-trees with adaptive adversaries, In Lecture Notes in Computer Science Volume 96 p.409-425.
John Lygeros, G Andersson, M Vrakopoulou, Peyman Mohajerin Esfahani (2012), Apparatus and method for detecting an intrusion in electric power networks.