1. Database-friendly random projections: Johnson–Lindenstrauss with binary coins;Achlioptas;Journal of Computer and System Sciences,2003
2. Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems;Anglade,2007
3. S.K. Belle, M. Waldvogel, Consistent deniable lying: privacy in mobile social networks, in: Workshop on Security and Privacy Issues in Mobile Phone Use.
4. O. Berthold, H. Langos, Dummy traffic against long term intersection attacks, in: Privacy Enhancing Technologies.
5. J. Bian, Jigdfs: A secure distributed file system, in: IEEE Symposium on Computational Intelligence in Cyber Security.