"General Secure Function Evaluation Using Standard Trusted Computing Hardware", Proceedings of the 9th Annual Conference on Privacy, Security, and Trust (PST), pp. 221-228, 07/2011.
"Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology", 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, pp. 252-267, 2009.
"Performance Evaluation of TPM-based Digital Wallets", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 179-186, 07/2010.