B. Pourebrahimi, J.C.A. Van Der Lubbe, Georg Dietz (2010), Digital analysis of papers for the authentication and dating of art, In Proceedings of the 12th IASTED International Conference on Signal and Image Processing, SIP 2010 p.93-100.

Z Erkin, MRT Beye, PJM Veugen (2010), Efficiently computing private recommendations, S.N. (Eds.), In Proceedings of ASCI 2010 p.1-8, Advanced School for Computing and Imaging.

Z Erkin, M Beye, PJM Veugen, RL Lagendijk (2010), Privacy enhanced recommender system, JH Weber J. Gosseling (Eds.), In Proceedings of the thirty-first symposium on Information Theory in the Benelux p.35-43, Werkgemeenschap voor Informatie- en Communicatietheorie.

A Mitrokotsa, N Komninos, C Douligeris (2010), Protection of an intrusion detection engine with watermarking in ad hoc networks, In International Journal of Network Security Volume 10 p.93-106.

A Mitrokotsa, C Dimitrakakis, P Peris-Lopez, JC Hernandez-Castro (2010), Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels, In IEEE Communications Letters Volume 14 p.1-3.

Z Erkin (2010), Secure signal processing: Privacy preserving cryptographic protocols for multimedia, PhD Thesis Delft University of Technology.

P Peris Lopez, JC Hernadez-Castro, JME Tapiador, E San Millan, JCA van der Lubbe (2010), Security flaws in an efficient pseudo-random number generator for low-power environments, In Lecture Notes in Computer Science Volume 42 p.25-35.

M.J.G. van Eeten, JM Bauer, H. Asghari, S. Tabatabaie (2010), The Role of Internet Service Providers in Botnet Mitigration, OECD Publishing.

C. Bezemer, A. Mesbah, A. van Deursen (2009), Automated Security Testing of Web Widget Interactions, H van Vliet, V Issarny (Eds.), In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'09) p.81-90, Association for Computing Machinery (ACM).

JM Bauer, MJG van Eeten (2009), Cybersecurity: stakeholder incentives, externalities and policy options, In Telecommunications Policy Volume 33 p.1-37.