"Online/Offline Signature Schemes for Devices with Limited Computing Capabilities", RSA Conference 2008, Cryptographers' Track (CT-RSA), pp. 301-317, 2008.
"General Secure Function Evaluation Using Standard Trusted Computing Hardware", Proceedings of the 9th Annual Conference on Privacy, Security, and Trust (PST), pp. 221-228, 07/2011.
"Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology", 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, pp. 252-267, 2009.
"Performance Evaluation of TPM-based Digital Wallets", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 179-186, 07/2010.
"Sensor Data Boundary Estimation for Anomaly Detection in Wireless Sensor Networks", IEEE 7th International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), San Francisco, IEEE, pp. 546-551, 11/2010.
"An Approach for Automatic Selection of Relevance Features in Intrusion Detection Systems", 2011 International Conference on Security and Management (SAM’11), Las Vegas, 07/2011.
"Labeled Data Collection for Anomaly Detection in Wireless Sensor Networks", 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP'11), Brisbane, pp. 269-274, 12/2010.
"Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules", 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), pp. 463-469, 05/2007.
"Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 171-178, 07/2010.
"Generalized Non-interactive Oblivious Transfer using Count-Limited Objects with Applications to Secure Mobile Agents", 12th International Conference on Financial Cryptography and Data Security, pp. 98-112, 2008.