"Multi-user dynamic proofs of data possession using trusted hardware", Proceedings of the 3rd ACM Conference on Data and Applicatoin Security and Privacy (CODASPY '13), pp. 353-364, 2013.
"General Secure Function Evaluation Using Standard Trusted Computing Hardware", Proceedings of the 9th Annual Conference on Privacy, Security, and Trust (PST), pp. 221-228, 07/2011.
"Performance Evaluation of TPM-based Digital Wallets", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 179-186, 07/2010.
"Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 171-178, 07/2010.
"Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology", 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, pp. 252-267, 2009.
"Generalized Non-interactive Oblivious Transfer using Count-Limited Objects with Applications to Secure Mobile Agents", 12th International Conference on Financial Cryptography and Data Security, pp. 98-112, 2008.
"Online/Offline Signature Schemes for Devices with Limited Computing Capabilities", RSA Conference 2008, Cryptographers' Track (CT-RSA), pp. 301-317, 2008.
"Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules", 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), pp. 463-469, 05/2007.