Sebastian Erdweg, Lennart C.L. Kats, T Rendel, C Kastner, K Ostermann, Eelco Visser (2011), SugarJ: Library-based language extensibility, K Fisher (Eds.), In Companion to the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2011, part of SPLASH 2011 p.187-188, ACM.
MJG van Eeten (2011), The economics of Cybersecurity, In Communications et Strategies Volume 81 p.13-21.
C Doerr, J Martin Hernandez (2010), A computational approach to multi-level analysis of network resilience, s.n. (Eds.), In The third conference on dependability p.125-132, Proceedings of Depend 2010.
A Mitrokotsa, M Rieback, AS Tanebaum (2010), Classifying RFID attacks and defenses, In Information Systems Frontiers: a journal of research and innovation Volume 12 p.491-505.
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Esther Palomar, Jan C.A. Van Der Lubbe (2010), Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security, In RFID 2010 p.45-52, IEEE.
Pedro Peris-Lopez, Enrique San Millan, Jan C.A. Van Der Lubbe, Luis A. Entrena (2010), Cryptographically secure pseudo-random bit generator for RFID tags, In 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010.
B. Pourebrahimi, J.C.A. Van Der Lubbe, Georg Dietz (2010), Digital analysis of papers for the authentication and dating of art, In Proceedings of the 12th IASTED International Conference on Signal and Image Processing, SIP 2010 p.93-100.
Z Erkin, MRT Beye, PJM Veugen (2010), Efficiently computing private recommendations, S.N. (Eds.), In Proceedings of ASCI 2010 p.1-8, Advanced School for Computing and Imaging.
Z Erkin, M Beye, PJM Veugen, RL Lagendijk (2010), Privacy enhanced recommender system, JH Weber J. Gosseling (Eds.), In Proceedings of the thirty-first symposium on Information Theory in the Benelux p.35-43, Werkgemeenschap voor Informatie- en Communicatietheorie.
A Mitrokotsa, N Komninos, C Douligeris (2010), Protection of an intrusion detection engine with watermarking in ad hoc networks, In International Journal of Network Security Volume 10 p.93-106.