F Borrelli, T Keviczky (2008), Distributed LQR design for identical dynamically decoupled systems, In IEEE Transactions on Automatic Control Volume 53 p.1901-1912.

MJ van den Hoven, E Rooksby (2008), Distributive justice and the value of information: a (broadly) Rawlsian approach, MJ van den Hoven, J Weckert (Eds.), In Information technology and moral philosophy p.376-396, Cambridge University Press.

MJ van den Hoven (2008), Information technology, privacy, and the protection of personal data, MJ van den Hoven, J Weckert (Eds.), In Information technology and moral philosophy p.301-321, Cambridge University Press.

MJ van den Hoven (2008), Moral Methodology and Information Technology, KE Himma, HT Tavani (Eds.), In The Handbook of Information and Computer Ethics p.49-69, Wiley.

B Johansson, T Keviczky, M Johansson, K.H Johansson (2008), Subgradient methods and consensus Algorithms for solving convex optimization problems, Abdallah, Chaouki .T (Eds.), In Proceedings of the 47th conference on decision and control p.4185-4190, CDC.

Jeroen Prins, Z Erkin, RL Lagendijk (2007), Anonymous fingerprinting with robust QIM watermarking techniques, In Eurasip Journal on Information Security Volume 2007 p.1-13.

M.J. van den Hoven, PE Vermaas (2007), Nano-technology and privacy: on continuous surveillance outside the panopticon, In The Journal of Medicine and Philosophy: a forum for bioethics and philosophy of medicine Volume 32 p.283-297.

Jeroen Prins, Z Erkin, RL Lagendijk (2007), Robust anonymus fingerprinting, R veldhuis, H Cronie (Eds.), In Proceedings of the 28th symposium on information theory in the Benelux p.59-66, Werkgemeenschap Informatie- en Communicatietheorie (WIC).

M.J. van den Hoven (2006), Nanotechnology and privacy: The instructive case of RFID, In International Journal of Applied Philosophy Volume 20 p.215-228.

HG van der Voort, MJG van Eeten (2006), Op zoek naar een nieuwe strategie voor cybersecurity, In Nieuwsbrief Crisisbeheersing Volume 4 p.27-29.