"Multi-user dynamic proofs of data possession using trusted hardware", Proceedings of the 3rd ACM Conference on Data and Applicatoin Security and Privacy (CODASPY '13), pp. 353-364, 2013.
"Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology", 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, pp. 252-267, 2009.
"Performance Evaluation of TPM-based Digital Wallets", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 179-186, 07/2010.
"General Secure Function Evaluation Using Standard Trusted Computing Hardware", Proceedings of the 9th Annual Conference on Privacy, Security, and Trust (PST), pp. 221-228, 07/2011.