Z Erkin, M Franz, J Guajardo, S Katzenbeisser, RL Lagendijk, T Toft (2009), Privacy-preserving face recognition, In Lecture Notes in Computer Science Volume 5672/2009 p.235-255.

Z Erkin, PJM Veugen, T Toft, RL Lagendijk (2009), Privacy-preserving user clustering in a social network, SN (Eds.), In Proceedings of the IEEE International Workshop on Information Forensics and Security, p.96-100, IEEE.

T Bianchi, PJM Veugen, A Piva, M Barni (2009), Processing in the encrypted domain using a composite signal representation:pros and cons, SN (Eds.), In Proceedings of the 2009 first IEEE international workshop on information forensics and security p.176-181, IEEE.

C Dimitrakakis, A Mitrokotsa (2009), Statistical decision making for authentication and intrusion detection, M. Kantardzic V. Palade M. Arif Wani (Eds.), In Proceedings of the eight international conference on machine learning and applications p.409-414, IEEE.

J.-H. Hoepman, PJM Veugen (2009), Threats and vulnerabilities of RFID and beyond, P. Kitsos Y. Zhang (Eds.), In Security in RFID and sensor networks (wireless networks and mobile communications) p.469-489, CRC Press.

T Keviczky, F Borrelli, K Fregene, D Godbole, G.J Balas (2008), Decentralized receding horizon control and coordination of autonomous vehicle formations, In IEEE Transactions on Control Systems Technology Volume 16 p.19-33.

F Borrelli, T Keviczky (2008), Distributed LQR design for identical dynamically decoupled systems, In IEEE Transactions on Automatic Control Volume 53 p.1901-1912.

MJ van den Hoven, E Rooksby (2008), Distributive justice and the value of information: a (broadly) Rawlsian approach, MJ van den Hoven, J Weckert (Eds.), In Information technology and moral philosophy p.376-396, Cambridge University Press.

MJ van den Hoven (2008), Information technology, privacy, and the protection of personal data, MJ van den Hoven, J Weckert (Eds.), In Information technology and moral philosophy p.301-321, Cambridge University Press.

MJ van den Hoven (2008), Moral Methodology and Information Technology, KE Himma, HT Tavani (Eds.), In The Handbook of Information and Computer Ethics p.49-69, Wiley.